1.
Community Guidelines
2.
Glossary
3.
Zero Knowledge Proofs
3.1.
Curated Resources
3.2.
Video Lecture Series
3.3.
Articles
3.3.1.
ZK Introductory
3.3.2.
Ingonyama Blogs
3.3.3.
ZKSNARKS
3.3.4.
STARKS
3.3.5.
Applications
3.3.6.
Vulnerabilities
3.4.
Hands-On ZK
3.5.
Protocols
3.5.1.
SNARK Protocols
3.5.2.
STARK Protocols
3.5.3.
Lookup Protocols
3.5.4.
Folding Scheme Protocols
3.5.5.
Other Protocols
3.6.
Mathematics
3.6.1.
Finite fields
3.6.2.
Cryptographic primitives
3.6.2.1.
Elliptic curves
3.6.2.2.
Hash functions
3.6.2.3.
Verifiable Delay functions
3.6.2.4.
Arithmetization
3.6.2.5.
Commitment Schemes
3.6.2.6.
Secure Multi Party Computation
3.6.2.7.
Proving Methods
3.6.3.
Computational Primitives
3.6.3.1.
Hardware acceleration
3.6.3.2.
Discrete Fourier Transforms
3.6.3.3.
Multi Scalar Multiplications
4.
Lattice based cryptography
4.1.
Fully Homomorphic Encryption
4.1.1.
Articles
4.1.2.
Schemes
4.1.3.
Libraries
4.1.4.
Mathematics
Light
Rust
Coal
Navy
Ayu
Ingopedia
STARKS
A collection of resources explaining Starks.
Introductory
Stark from home series
STARK glossary
Stark Thread - Eli Ben Sasson
Papers
STARK paper
DEEP - FRI
Proximity Gaps for Reed-Solomon Codes
Stark tutorials
Vitalik
Starks 1 proofs with polynomials
Starks 2
Starks 3
Stark math series
Journey Begins
Arithmetization I
Arithmetization II
Low Degree Testing
A framework for efficient STARKS
Stark 101 - hands on
STARK Recursion
BReaking down recursive starks
Stark recursion
Recursive STARK -Avihu Levy
Stark Anatomy series
Anatomy of a STARK
Part2: BrainSTARK
Code: Brainfuck
Applications
EthSTARK
code
documentation
Stone Prover
An overview
Stark security
STARK round by round soundness and security - Ben Sasson