Cypher Technical Documentation
  • Introduction
    • Overview
    • Key Features and Technical Advantages
    • Developer Focused Development
  • Technical Innovation
    • Fully Homomorphic Encryption EVM (fhEVM)
    • Layer 3 Architecture
    • Privacy-Preserving Data Management
    • Seamless Integration
    • Optimized for Privacy-Critical Applications
  • Cypher’s fhEVM Technology
    • What is fhEVM?
    • Architecture of fhEVM
    • Detailed Supported Operations in fhEVM
  • Deploying Smart Contracts on Cypher Testnet
    • Configuration and Deployment
    • Obtaining Testnet Tokens
  • Operations in a fhEVM Framework
    • Concepts
    • Random
    • Secret Store and Access Control in Encrypted Smart Contracts
    • Using fhevmjs for Encrypted Smart Contract Development
  • Tokenomics V2
    • $DEAI Token
    • Token Utility
    • Token Distribution
  • Cypher Layer 3 Tech Integration
  • Glossary
Powered by GitBook
On this page
  • Standard Tooling Support:
  • Solidity-Compatible fhEVM:
  • API and SDK Toolkits:
  1. Technical Innovation

Seamless Integration

Cypher is designed for frictionless adoption within the Ethereum ecosystem, offering full compatibility with existing tools and frameworks:

Standard Tooling Support:

  • Fully integrates with popular Ethereum development tools such as Hardhat, Truffle, and Remix.

  • Supports automated contract verification and deployment workflows through Cypherscan and its APIs.

Solidity-Compatible fhEVM:

  • Allows existing Solidity contracts to be deployed without modifications, enabling instant compatibility with fhEVM.

  • Developers can use familiar tools and libraries, reducing the learning curve for adopting Cypher’s privacy-centric platform.

API and SDK Toolkits:

  • Provides developer-friendly SDKs like fhevmjs, which supports encrypted inputs, re-encryption, and ciphertext handling.

  • Enables streamlined encryption workflows for dApps, from client-side parameter encryption to smart contract interactions.

PreviousPrivacy-Preserving Data ManagementNextOptimized for Privacy-Critical Applications

Last updated 5 months ago