1.
Community Guidelines
2.
Zero Knowledge Proofs
2.1.
Curated Resources
2.2.
Video Lecture Series
2.3.
Articles
2.3.1.
ZK Introductory
2.3.2.
Ingonyama Blogs
2.3.3.
ZKSNARKS
2.3.4.
STARKS
2.3.5.
Applications
2.3.6.
Vulnerabilities
2.4.
Hands-On ZK
2.5.
Protocols
2.6.
Mathematics
2.6.1.
Finite fields
2.6.2.
Cryptographic primitives
2.6.2.1.
Elliptic curves
2.6.2.2.
Hash functions
2.6.2.3.
Verifiable Delay functions
2.6.2.4.
Arithmetization
2.6.2.5.
Commitment Schemes
2.6.2.6.
Secure Multi Party Computation
2.6.2.7.
Proving Methods
2.6.3.
Computational Primitives
2.6.3.1.
Hardware acceleration
2.6.3.2.
Discrete Fourier Transforms
2.6.3.3.
Multi Scalar Multiplications
3.
Homomorphic Encryption
Light
Rust
Coal
Navy
Ayu
Ingopedia
Vulnerabilities
Potential vulnerabilities in ZK systems
ZK bug tracker by0xparc
bug tracker intro
Vulnerabilities in zk systems
Vulnerability in Fiat-Shamir
Frozen heart vulnerability: Bulletproof
Frozen heart vulnerability: Plonk
Hertzbleed attack: sidechannel
paper
Stress testing Zk systems: Zk docs
Specialized ZKP vulnerabilities
security of zkp projects: same but different