ABHIJKLMNOPQRSTUVWXYZ
1
Oct 11thCategory
2
What to know about Zero KnowledgeAlbert Ni, Barry Whitehat, gubsheep, Vitalik ButerinGeneral
3
Designing Public Goods Using ZKPsRachelApplication
4
A ZoKrates UpdateThibaut SchaefferTooling
5
Little Things I’ve Learned in Developing Halo2 CircuitsChih-Cheng LiangTooling
6
Dark Forest: Lessons from 3 Years of On-Chain GaminggubsheepApplication
7
Oct 12th
8
Interep: An Identity Bridge from Web2 to Web3Geoff LamperdApplication
9
Lessons from the Field: Threat Modeling for the Everyday Use of Digital CurrencyAndrewApplication
10
Penumbra: Building a Private DEX with ZKPs and Threshold CryptographyHenry de ValenceApplication
11
Building Privacy-Protecting InfrastructureOskar ThorénApplication
12
A SNARKs Tale: A Story of Building SNARK Solutions on MainnetJackson Blazensky, Severiano SisnerosScaling
13
Are Your Zero-Knowledge Proofs Correct?Jon StephensSecurity
14
ZK Proof Performance and Security CharacteristicsBrian Wilkes, CFASecurity
15
Building a Unirep ecosystemChance HudsonApplication
16
Public Goods and Experiments, the journey of ZkopruWanseob LimApplication
17
Private Exchange on ZKOPRUTakamichi TsutsumiApplication
18
Solidity Dev to ZK Dev: Why and How You Should Start ZK Dev NowIan Brighton, Jack GilcrestTooling
19
Scalability is Boring, Privacy is Dead: ZK-Proofs, What are They Good for?Ian MiersGeneral
20
Recursive ZK Applications and AffordancesNalin Bhardwaj, Ying TongTooling
21
zkEVM Vs EVM: Full Equivalence?Ignasi RamosScaling
22
Oct 13th
23
Private Value Transfer in 10 LinesMaxim VezenovApplication
24
Non-interactive, Unique Nullifiers: The Key to The Next Era of ZKAayush GuptaApplication
25
Public-Private ComposabilityMike ConnorGeneral
26
Improving Performance of Provable Computations Using RustFederica Sofía Moletta, Herman ObstTooling
27
A new DeFi Primitive - Private Trading with Aztec ConnectJan Beneš, Joe AndrewsApplication
28
ZK Application Design PatternsLakshman Sankar, Yi SunApplication
29
Anonymous Signalling on EthereumCedoorApplication
30
Rate Limiting NullifierAtHeartEngineerApplication
31
Why We Need Threshold FHE for BlockchainsWei DaiApplication
32
Vampire, a Novel, Cheap to Verify, zkSNARKMichal ZajacTooling
33
Using a Hybrid UTXO and Account-based State Model in a ZK RollupBobbin ThreadbareScaling
34
Scroll Pre-Alpha Testnet UpgradeYe ZhangScaling
35
Proving EVM Bytecode Execution in the zk-EVMFranklin Delehelle, Olivier BégassatScaling
36
Oct 13th, The ZK SLS at Devcon
37
ZK Circuits for Elliptic Curve Operations in Halo2Yi Sun (Axiom)Application
38
Proving System Challenges from ZKML Jason Morton (zKonduit / 0xPARC)Scaling
39
Maze - Aggregation Tool for Circom-PLONK ProofsJanmajaya Mall (EF PSE)Tooling
40
Cryptographic Optimizations in AztecAdrian Hamelink (Aztec)Scaling
41
Optimizing Cryptographic Algorithms used in GnarkYoussef El Housni (Gnark)Tooling
42
[Panel] Next-Generation DSLs and IRsYing Tong Lai (0xPARC / ECC), with Jordi B (Polygon Hermez), Louis G (Starkware), Brandon K (Mina), and Kev W (Aztec)Tooling
43
STARKs in SNARKsJordi Baylina (Polygon Hermez)Scaling
44
Proof Systems for zkRollupsYe Zhang (Scroll)Scaling
45
SNARK Light ClientsUma Roy, John Guibas (Succinct Labs)Application
46
Using ZKP for better p2p messaging with WakuOskar Thoren (Vac)Application
47
Poseidon VM: a zkApp friendly VM with EVM compatibilityShumo Chu (p0xeidon labs)Application
48
Zero-Knowledge Machine LearningJason Morton (zKonduit / 0xPARC)Application
49
Scaling up Trustless Neural Network Inference with Zero-Knowledge ProofsYi Sun (Axiom)Application
50
WorldcoinRemco Bloeman (Worldcoin)Application
51
Crypt-Keeper ZK Identity WalletAtHeartEngineer and Iskander (EF PSE)Application
52
Unirep Social - A demo application of Unirep protocolVivian Jeng (EF PSE)Application
53
Zkitter - Anonymous Social Network0xTsukino (EF PSE)Application
54
heyanon.xyzVivek Bhupatiraju (Personae Labs / 0xPARC)Application
55
zkemail: Decentralized ID Verification on Chain Without ServersAayush Gupta, Sampriti Panda (Personae Labs / 0xPARC)Application
56
Finding bugs in ZK Circuits: An Exploration of Veridise ToolsJon Stephens (Veridise)Security
57
Zk Bug TrackerKyle Charbonnet (EF PSE)Security
58
Benchmarks for Formal VerificationMichael Chu (0xPARC) and Jason Morton (zKonduit / 0xPARC)Security
59
Solving Polynomial Equation Systems over Large Prime Fields: a ReviewLucas Vella (Ethereum Foundation)Security
60
[Panel] Auditing Strategy for zkEVMBarry Whitehat (EF PSE), with Haichen S (Scroll), Jordi Baylina (Polygon Hermez), and David T (EF)Security
61
Oct 14th
62
Scaling Privacy with StarlightChaitanya Konda, Paul BrodyApplication
63
ZK Badges: A new primitive for self sovereign identitiesdhadrienApplication
64
Towards a Feature-Complete and Backwards-Compatible Privacy Layer for EthereumKyle Charbonnet, Wei Dai Application
65
ZKPs and "Programmable Cryptography"gubsheepGeneral
66
Technical Details of the Opcode Compatible zkEVMJordi BaylinaScaling
67
68
69
70
71
SummaryCount of CategoryPercentage
72
Scaling1016.39%
73
Application3150.82%
74
Security711.48%
75
Tooling914.75%
76
General46.56%
77
Total61100.00%
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100