Cairo – How does it work? How are proofs created? Read the Cairo Whitepaper.
Towards Transparent and Scalable Computational Integrity and Privacy
Prof. Eli Ben Sasson @ TAU’s CyberWeek 2017
Part 5: The last step
Part 2: Execution trace and polynomial constraints
Part 3: “We need to go deeper”
Liquidity 2020: David Levit will describe our new post-quantum secure digital signature scheme.
Eli Ben-Sasson at the Newton Gateway to Mathematics series about Privacy Enhancing Technologies in Practice.
Choose TopicDiscordMarketing/EventsCustomers/Partner InquiriesDev Training/EducationBug Report