- 1. Community Guidelines
- 2. Glossary
- 3. Zero Knowledge Proofs
- 3.1. Curated Resources
- 3.2. Video Lecture Series
- 3.3. Articles
- 3.3.1. ZK Introductory
- 3.3.2. Ingonyama Blogs
- 3.3.3. ZKSNARKS
- 3.3.4. STARKS
- 3.3.5. Applications
- 3.3.6. Vulnerabilities
- 3.4. Hands-On ZK
- 3.5. Protocols
- 3.5.1. SNARK Protocols
- 3.5.2. STARK Protocols
- 3.5.3. Lookup Protocols
- 3.5.4. Folding Scheme Protocols
- 3.5.5. Other Protocols
- 3.6. Mathematics
- 3.6.1. Finite fields
- 3.6.2. Cryptographic primitives
- 3.6.2.1. Elliptic curves
- 3.6.2.2. Hash functions
- 3.6.2.3. Verifiable Delay functions
- 3.6.2.4. Arithmetization
- 3.6.2.5. Commitment Schemes
- 3.6.2.6. Secure Multi Party Computation
- 3.6.2.7. Proving Methods
- 3.6.3. Computational Primitives
- 3.6.3.1. Hardware acceleration
- 3.6.3.2. Discrete Fourier Transforms
- 3.6.3.3. Multi Scalar Multiplications
- 4. Lattice based cryptography
- 4.1. Fully Homomorphic Encryption
- 4.1.1. Articles
- 4.1.2. Schemes
- 4.1.3. Libraries
- 4.1.4. Mathematics