Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 1— Verifiable Computation with zk-SNARKsIn my view, one of the most consequential developments in cryptography as well as distributed computing in the past decade has been the…Jul 14
Lauri PeltonenHow Mina offloads computationPerforming computations off-chain has certain benefits in Mina, but one has to be aware of its limitations as well.Oct 10Oct 10
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 5-Arithmetic Circuits and R1CSIn previous posts, we have looked at some basics of zero-knowledge proofs for privacy-sensitive verifiable computation. In part 4 we looked…Jul 14Jul 14
InBeyond the Crypto HorizonbyginoongbakulawTime to research: MarlinMarlin is a verifiable computing protocol featuring Trusted Execution Environments (TEE) and ZK-based coprocessors to delegate complex…Jul 23Jul 23
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 1— Verifiable Computation with zk-SNARKsIn my view, one of the most consequential developments in cryptography as well as distributed computing in the past decade has been the…Jul 14
Lauri PeltonenHow Mina offloads computationPerforming computations off-chain has certain benefits in Mina, but one has to be aware of its limitations as well.Oct 10
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 5-Arithmetic Circuits and R1CSIn previous posts, we have looked at some basics of zero-knowledge proofs for privacy-sensitive verifiable computation. In part 4 we looked…Jul 14
InBeyond the Crypto HorizonbyginoongbakulawTime to research: MarlinMarlin is a verifiable computing protocol featuring Trusted Execution Environments (TEE) and ZK-based coprocessors to delegate complex…Jul 23
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 2 — Math Basics for CryptographyWe started this series with a previous article giving a broad-overview of zero-knowledge proofs and their role in enabling verifiable…Jul 14
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 6-Quadratic Arithmetic ProgramsIn the previous article (part 5) in this series on zk-SNARKs, we looked at how computations that need verification can be first encoded in…Jul 14
Atoma NetworkPersonal AI — Verifiable AI, Proof of Integrity, & Atoma NetworkIf you’re wondering why there’s so much talk about AI, private data, and AI encryption methods, consider how much of your life is…Aug 6