InZkNoidbyZkNoidZkNoid Patterns Overview: Factory of Lottery RoundsIn this article, we will explore the ZkNoid L1 Lottery code, shedding light on the design patterns and architectural choices we made.Dec 6
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 1— Verifiable Computation with zk-SNARKsIn my view, one of the most consequential developments in cryptography as well as distributed computing in the past decade has been the…Jul 14
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 4— Polynomial CommitmentsIn part 2 of this series, we went over some basic mathematical background needed for cryptography, namely finite fields, cyclic groups, and…Jul 14Jul 14
0xHusenThe end game of MSM-batch affine in elliptic curve point additionSince my idea about hardware implementation of batch affine in elliptic curve point addition, which originally came from Aztec barretenberg…Nov 22Nov 22
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 5-Arithmetic Circuits and R1CSIn previous posts, we have looked at some basics of zero-knowledge proofs for privacy-sensitive verifiable computation. In part 4 we looked…Jul 14Jul 14
InZkNoidbyZkNoidZkNoid Patterns Overview: Factory of Lottery RoundsIn this article, we will explore the ZkNoid L1 Lottery code, shedding light on the design patterns and architectural choices we made.Dec 6
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 1— Verifiable Computation with zk-SNARKsIn my view, one of the most consequential developments in cryptography as well as distributed computing in the past decade has been the…Jul 14
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 4— Polynomial CommitmentsIn part 2 of this series, we went over some basic mathematical background needed for cryptography, namely finite fields, cyclic groups, and…Jul 14
0xHusenThe end game of MSM-batch affine in elliptic curve point additionSince my idea about hardware implementation of batch affine in elliptic curve point addition, which originally came from Aztec barretenberg…Nov 22
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 5-Arithmetic Circuits and R1CSIn previous posts, we have looked at some basics of zero-knowledge proofs for privacy-sensitive verifiable computation. In part 4 we looked…Jul 14
Luis SoaresYour Next Big Leap Starts HereA mentor is often the difference between good and great.Nov 19
Moonchain | Home of DePINWhy and How Beam-SNARK WorksZero-Knowledge Succinct Non-Interactive Arguments of Knowledge (Beam-SNARK) is a groundbreaking method that allows one to prove the truth…Nov 27
RocketMe Up CybersecurityComparing ZK-SNARKs and ZK-STARKs — Key Distinctions in Blockchain Privacy ProtocolsExplore the unique strengths, trade-offs, and future potential of ZK-SNARKs and ZK-STARKs in blockchain privacy and scalability.Nov 19