- Proximity Gaps: What Happened and How Does It Affect our SNARKs
- Why does FRI work?
- Notes on Witness-extended Emulation
- Resources for Writing Security Proofs
- Highlights of libZK, the Google Wallet ZKP
- Comparing Ligerito and WHIR
- Privacy-preserving Contact Discovery for Bluesky
- Chosen-instance Attack
- ZODA: An Explainer
- Sampling for Proximity and Availability
- Paper Speedrun: Protostar
- Emulating Witness Encryption with Threshold Cryptography and ZKPs
- Sangria: a Folding Scheme for PLONK
- Paper Speedrun: zk-creds
- Functional Commitments: ZK under a different lens
- Mental Poker in the Age of SNARKs - Part 2
- Mental Poker in the Age of SNARKs - Part 1
#Anonymous Credentials
#BCC
#Data Availability Sampling
#Folding
#Geometry Notebook
#Identity-Based Encryption
#Mental Poker
#MPC
#Privacy
#Proximity Testing
#Resources
#Security
#Social Networks
#Speedrun
#Succinct Proofs
#Threshold Cryptography
#Witness Encryption
#Zero-Knowledge
#ZK Hack
#ZkSecurity