1.
Community Guidelines
2.
Glossary
3.
Zero Knowledge Proofs
3.1.
Curated Resources
3.2.
Video Lecture Series
3.3.
Articles
3.3.1.
ZK Introductory
3.3.2.
Ingonyama Blogs
3.3.3.
ZKSNARKS
3.3.4.
STARKS
3.3.5.
Applications
3.3.6.
Vulnerabilities
3.4.
Hands-On ZK
3.5.
Protocols
3.5.1.
SNARK Protocols
3.5.2.
STARK Protocols
3.5.3.
Lookup Protocols
3.5.4.
Folding Scheme Protocols
3.5.5.
Other Protocols
3.6.
Mathematics
3.6.1.
Finite fields
3.6.2.
Cryptographic primitives
3.6.2.1.
Elliptic curves
3.6.2.2.
Hash functions
3.6.2.3.
Verifiable Delay functions
3.6.2.4.
Arithmetization
3.6.2.5.
Commitment Schemes
3.6.2.6.
Secure Multi Party Computation
3.6.2.7.
Proving Methods
3.6.3.
Computational Primitives
3.6.3.1.
Hardware acceleration
3.6.3.2.
Discrete Fourier Transforms
3.6.3.3.
Multi Scalar Multiplications
4.
Lattice based cryptography
4.1.
Fully Homomorphic Encryption
4.1.1.
Articles
4.1.2.
Schemes
4.1.3.
Libraries
4.1.4.
Mathematics
Light
Rust
Coal
Navy
Ayu
Ingopedia
Schemes
UNDER CONSTRUCTION
👷
Public key encryption: HE
Paper
BGV
Paper
BFV
Paper
SWHE
Paper
CKKS
Paper
FHEW
Paper
Bootstrapping in FHEW like schemes
TFHE
Paper
TFHE GLOT (GLEV)
Joye
PBS and efficient Neural networks
Deep dive: ZAMA AI - Ilaria Chilloti
Part 1: Ciphertext types
Part 2: Encoding and linear ops
part 3: key switching and levelled multiplications
Part 4: programmable bootstrapping