In this week’s episode, Anna and Kobi Gurkan speak with Dmitry Khovratovich, researcher at the Ethereum Foundation, Dusk Network, and ABDK Consulting and JP Aumasson CSO at Taurus. This episode compares symmetric and asymmetric cryptography as well as a deep dive into hash functions. They explore what hash functions are used for, the process of developing and improving hash functions, and what it means for a hash function to be “zk friendly”.
Here are some additional links for this episode:
- Dmitry Khovratovich Twitter
- Ethereum Foundation
- Dusk Network
- ABDK Consulting
- JP Aumasson Twitter
- JP Aumasson Website
- Taurus Twitter
- Taurus Website
- ZK8: New Directions in ZK hashing – Dmitry Khovratovich – Ethereum Foundation
- ZK8: On ZK hashes – JP Aumasson – Taurus
- ZK7: Security of ZKP projects: same but different – JP Aumasson – Taurus
- Serious Cryptography – JP Aumasson, 2017
- Too Much Crypto – JP Aumasson, 2019
- Crypto Dictionary – JP Aumasson
- Scalable, transparent, and post-quantum secure computational integrity – Ben-Sasson, Bentov, Horesh, Riabzev, 2018, page 71
- NIST National Institute of Standards and Technology
- Poseidon Network
- Reinforced Concrete – Maharramov, 2021
- Nova – Recursive Zero-Knowledge Arguments from Folding Schemes – Kothapalli, Setty, Tzialla, 2021
- ZK8: Fantastic Beasts: unfolding ZK hardware – Omer Shlomovits – Ingonyama
Find the Aleo repo here github.com/aleohq.
Today’s episode is sponsored by Anoma.
Anoma is a set of protocols that enable self sovereign coordination.
Anoma’s first fractal instance Namada is planned for later in 2022, and it focuses on enabling shielded transfers for any assets, with a few second transaction latency and near zero fees.
Visit anoma.net for more information.
If you like what we do: