URL has been copied successfully!
Implementing ZK-focused hash schemes
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Implementing ZK-focused hash schemes

In my last post, I described the ZK-oriented Ciminion AE (Dobraunig et al., 2021) scheme and implemented it using the circom2 DSL for writing zkSNARK<... First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2022/07/07/implementing-zk-focused-hash-schemes/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link