PinnedAndrzej BrońskiZK Hack Kraków: Winning Double with Risc0Hackathons are renowned for fostering innovation and creativity, and ZK Hack Kraków was no exception.Jun 22Jun 22
PinnedJonas PauliAuthorized Anonymous Voting with ZKAcropolis —A privacy preserving voting zkAppJun 20Jun 20
PinnedMark A. GreensladeCasper 2.0 Deep Dive IA series of technical articles covering Casper 2.0Jul 121Jul 121
PinnedMark A. GreensladeIntroducing LITMUSAll proofs emitted by a cryptographically secured system must be verifiable by an independent observer with reasonable cost in both space…May 26May 26
PinnedQuinn DoughertyFinance as a Reactive System? Verifying ACTUS Traces with Linear Temporal LogicFinancial interactions are like a traffice lightMar 14Mar 14
PinnedJonas PauliZK-CSPR: Scaling Casper (V0.1)This design document of a zero-knowledge rollup system intended to increase the throughput of native Casper transactions.Mar 11Mar 11
PinnedMarijanAnnouncing risc0pkgs: Your RISC0 Zero-Knowledge Project Built and Deployed With NixWe show you how you can get started building and deploying your RISC0 project with the power of Nix.Feb 7Feb 7
PinnedJonas PauliMerkle Trees and PrivacyThis article will review the implementation details of a privacy enhanced Merkle Tree and explain the utilization of zero knowledge proofs…Mar 8Mar 8
PinnedNick Van den BroeckThe security risks of centralized L2Security risks that come with centralized L2s, and how to design a proper strategy and architecture to circumvent them.Jan 9Jan 9