Frank MangoneCryptography 101: Zero Knowledge Proofs (Part 2)This second round of zero knowledge proofs will take us on a journey to understand a more general framework. Hang tight!Jun 25
InCoinmonksbyCrypto FairyUnder the hood of zkSNARKs — PLONK protocol: Part 1PLONK is one of the zero-knowledge proving systems that belong to the SNARK group. Compared to Groth16, which is an older system, PLONK…Nov 2, 20231
InRemix ProjectbyRob StupayRemix Release v0.48.0EIP 6963 supported. Plonk scripts. Scripts for CREATE2.Apr 231Apr 231
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part3Many materials available online explain the basics of the PLONK protocol, often referencing Vitalik’s example P(x)=x3+x+5=35 from his…Nov 11, 20232Nov 11, 20232
Crypto FairySangria: A PLONK-ish folding schemeFolding schemes are optimization techniques used by Zero Knowledge Proofs. They target two main areas: memory usage and proof generation…Feb 13Feb 13
Frank MangoneCryptography 101: Zero Knowledge Proofs (Part 2)This second round of zero knowledge proofs will take us on a journey to understand a more general framework. Hang tight!Jun 25
InCoinmonksbyCrypto FairyUnder the hood of zkSNARKs — PLONK protocol: Part 1PLONK is one of the zero-knowledge proving systems that belong to the SNARK group. Compared to Groth16, which is an older system, PLONK…Nov 2, 20231
InRemix ProjectbyRob StupayRemix Release v0.48.0EIP 6963 supported. Plonk scripts. Scripts for CREATE2.Apr 231
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part3Many materials available online explain the basics of the PLONK protocol, often referencing Vitalik’s example P(x)=x3+x+5=35 from his…Nov 11, 20232
Crypto FairySangria: A PLONK-ish folding schemeFolding schemes are optimization techniques used by Zero Knowledge Proofs. They target two main areas: memory usage and proof generation…Feb 13
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part4This article will discuss the permutation check in PLONK, which I believe is the second most challenging aspect of the protocol. The most…Nov 14, 20232
Crypto FairyFiat-Shamir Exploit to Attack a Plonk VerifierThis experiment was inspired by a recent YouTube publication from the OpenZeppelin team titled “The Last Challenge Attack”, which focused…Dec 18, 2023
InCoinmonksbyCrypto FairyUnder the hood of zkSNARKs — PLONK protocol: Part 2In the previous article of the PLONK series, we covered the core of the protocol, the KZG commitment scheme, and how polynomial linear…Nov 7, 2023