Breaking Down the Puzzles in ZK Hack V

Breaking Down the Puzzles in ZK Hack V

A look into the three puzzles solved by the Zellic cryptography team for ZK Hack V ...

Two Vulnerabilities in gnark’s Groth16 Proofs

| | FEATURED, ZK
An analysis of two vulnerabilities Zellic discovered that broke zero-knowledge and soundness of gnark’s Groth16 proofs with commitments ...

Signal’s Usernames and Ristretto Hashes

A look into Signal's use of Ristretto hashes and zero-knowledge proofs for usernames ...

How Do MPC Wallets Work?

A primer on MPC wallets and their security features and pitfalls ...
How Does Zcash Work?

How Does Zcash Work?

How does Zcash work? Understanding Zerocash and Zcash ...
Breaking Down the Puzzles in ZK Hack IV

Breaking Down the Puzzles in ZK Hack IV

| | ZK
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack IV ...
MPC From Scratch: Everyone Can Do it!

MPC From Scratch: Everyone Can Do it!

Building an implementation of garbled circuits from the ground up ...

What Is a ZK Audit?

A look into the ZK audit process and techniques the leading ZK auditors employ to examine ZK circuits ...
What Are Elliptic Curve Pairings?

What Are Elliptic Curve Pairings?

| | ZK
An introduction to what pairings are and how they are motivated, with a particular focus on elliptic curve pairings ...

CSPRNGs: How to Properly Generate Random Numbers

| | ZK
An in-depth guide to secure random number generation ...