1.
Community Guidelines
2.
Glossary
3.
Zero Knowledge Proofs
3.1.
Curated Resources
3.2.
Video Lecture Series
3.3.
Articles
3.3.1.
ZK Introductory
3.3.2.
Ingonyama Blogs
3.3.3.
ZKSNARKS
3.3.4.
STARKS
3.3.5.
Applications
3.3.6.
Vulnerabilities
3.4.
Hands-On ZK
3.5.
Protocols
3.5.1.
SNARK Protocols
3.5.2.
STARK Protocols
3.5.3.
Lookup Protocols
3.5.4.
Folding Scheme Protocols
3.5.5.
Other Protocols
3.6.
Mathematics
3.6.1.
Finite fields
3.6.2.
Cryptographic primitives
3.6.2.1.
Elliptic curves
3.6.2.2.
Hash functions
3.6.2.3.
Verifiable Delay functions
3.6.2.4.
Arithmetization
3.6.2.5.
Commitment Schemes
3.6.2.6.
Secure Multi Party Computation
3.6.2.7.
Proving Methods
3.6.3.
Computational Primitives
3.6.3.1.
Hardware acceleration
3.6.3.2.
Discrete Fourier Transforms
3.6.3.3.
Multi Scalar Multiplications
4.
Lattice based cryptography
4.1.
Fully Homomorphic Encryption
4.1.1.
Articles
4.1.2.
Schemes
4.1.3.
Libraries
4.1.4.
Mathematics
Light
Rust
Coal
Navy
Ayu
Ingopedia
Mathematics
UNDER CONSTRUCTION
👷
Discrete & Continuous Fourier Transform
FFT
Encryption Method
LWE
GGSW
Techniques
Bootstrapping