ZK

Breaking Down the Puzzles in ZK Hack V
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack V ...
Two Vulnerabilities in gnark’s Groth16 Proofs
An analysis of two vulnerabilities Zellic discovered that broke zero-knowledge and soundness of gnark’s Groth16 proofs with commitments ...
Signal’s Usernames and Ristretto Hashes
A look into Signal's use of Ristretto hashes and zero-knowledge proofs for usernames ...

Breaking Down the Puzzles in ZK Hack IV
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack IV ...

MPC From Scratch: Everyone Can Do it!
Building an implementation of garbled circuits from the ground up ...
What Is a ZK Audit?
A look into the ZK audit process and techniques the leading ZK auditors employ to examine ZK circuits ...

What Are Elliptic Curve Pairings?
An introduction to what pairings are and how they are motivated, with a particular focus on elliptic curve pairings ...
CSPRNGs: How to Properly Generate Random Numbers
An in-depth guide to secure random number generation ...