- Privacy-preserving Contact Discovery for Bluesky
- Chosen-instance Attack
- ZODA: An Explainer
- Sampling for Proximity and Availability
- Paper Speedrun: Protostar
- Emulating Witness Encryption with Threshold Cryptography and ZKPs
- Sangria: a Folding Scheme for PLONK
- Paper Speedrun: zk-creds
- Functional Commitments: ZK under a different lens
- Mental Poker in the Age of SNARKs - Part 2
- Mental Poker in the Age of SNARKs - Part 1