In the last few years, several practitioners have proposed zk-focused cryptographic constructions such as hashing and encryption primitives that opera…
First seen on research.kudelskisecurity.com
Jump to article: research.kudelskisecurity.com/2022/05/02/implementing-a-zk-focused-authenticated-encryption-scheme/