1.
Community Guidelines
2.
Glossary
3.
Zero Knowledge Proofs
3.1.
Curated Resources
3.2.
Video Lecture Series
3.3.
Articles
3.3.1.
ZK Introductory
3.3.2.
Ingonyama Blogs
3.3.3.
ZKSNARKS
3.3.4.
STARKS
3.3.5.
Applications
3.3.6.
Vulnerabilities
3.4.
Hands-On ZK
3.5.
Protocols
3.5.1.
SNARK Protocols
3.5.2.
STARK Protocols
3.5.3.
Lookup Protocols
3.5.4.
Folding Scheme Protocols
3.5.5.
Other Protocols
3.6.
Mathematics
3.6.1.
Finite fields
3.6.2.
Cryptographic primitives
3.6.2.1.
Elliptic curves
3.6.2.2.
Hash functions
3.6.2.3.
Verifiable Delay functions
3.6.2.4.
Arithmetization
3.6.2.5.
Commitment Schemes
3.6.2.6.
Secure Multi Party Computation
3.6.2.7.
Proving Methods
3.6.3.
Computational Primitives
3.6.3.1.
Hardware acceleration
3.6.3.2.
Discrete Fourier Transforms
3.6.3.3.
Multi Scalar Multiplications
4.
Lattice based cryptography
4.1.
Fully Homomorphic Encryption
4.1.1.
Articles
4.1.2.
Schemes
4.1.3.
Libraries
4.1.4.
Mathematics
Light
Rust
Coal
Navy
Ayu
Ingopedia
ZKSNARKS
A collection of resources explaining ZKSnarks.
Trusted Setup
Introduction -Vitalik
Aztec Ceremony
Trusted setup - Tau
Setup ceremonies
Zk snark setup phase
Vitalik Snark tutorial
Snarks 1: QAP from zero to hero
Snarks 2: Elliptic curve pairings
Snarks 3: Zk snarks
Recursive Snarks
Recursive SNARKs - Stanford lecs
Recursive SNARK -zkProof
Recursive SNARK - overview - Michael Straka
Fast Recursive arguments based on Plonk and Halo
Field selection for recursive SNARKS