Frank MangoneCryptography 101: Zero Knowledge Proofs (Part 2)This second round of zero knowledge proofs will take us on a journey to understand a more general framework. Hang tight!Jun 25
Crypto FairyinCoinmonksUnder the hood of zkSNARKs — PLONK protocol: Part 1PLONK is one of the zero-knowledge proving systems that belong to the SNARK group. Compared to Groth16, which is an older system, PLONK…Nov 2, 20231
Rob StupayinRemix ProjectRemix Release v0.48.0EIP 6963 supported. Plonk scripts. Scripts for CREATE2.Apr 231Apr 231
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part 6Final article in PLONK series. Here we will implement Prover and the Verifier. In the previous article we coded trusted setup, gate and…Nov 22, 20231Nov 22, 20231
Crypto FairySangria: A PLONK-ish folding schemeFolding schemes are optimization techniques used by Zero Knowledge Proofs. They target two main areas: memory usage and proof generation…Feb 13Feb 13
Frank MangoneCryptography 101: Zero Knowledge Proofs (Part 2)This second round of zero knowledge proofs will take us on a journey to understand a more general framework. Hang tight!Jun 25
Crypto FairyinCoinmonksUnder the hood of zkSNARKs — PLONK protocol: Part 1PLONK is one of the zero-knowledge proving systems that belong to the SNARK group. Compared to Groth16, which is an older system, PLONK…Nov 2, 20231
Rob StupayinRemix ProjectRemix Release v0.48.0EIP 6963 supported. Plonk scripts. Scripts for CREATE2.Apr 231
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part 6Final article in PLONK series. Here we will implement Prover and the Verifier. In the previous article we coded trusted setup, gate and…Nov 22, 20231
Crypto FairySangria: A PLONK-ish folding schemeFolding schemes are optimization techniques used by Zero Knowledge Proofs. They target two main areas: memory usage and proof generation…Feb 13
Crypto FairyinCoinmonksUnder the hood of zkSNARKs — PLONK protocol: Part 2In the previous article of the PLONK series, we covered the core of the protocol, the KZG commitment scheme, and how polynomial linear…Nov 7, 2023
Crypto FairyFiat-Shamir Exploit to Attack a Plonk VerifierThis experiment was inspired by a recent YouTube publication from the OpenZeppelin team titled “The Last Challenge Attack”, which focused…Dec 18, 2023
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part4This article will discuss the permutation check in PLONK, which I believe is the second most challenging aspect of the protocol. The most…Nov 14, 20231