Blog posts tagged 'cryptography'
Explaining SNARKs Part II: Blind Evaluation of Polynomials
Part I In this post, we recall the notion of a polynomial, and explain the notion of blind evaluation of...
BLS12-381: New zk-SNARK Elliptic Curve Construction
Our team is continually working to improve the security, performance and usability of our privacy-preserving shielded transactions . As we...
Explaining SNARKs Part I: Homomorphic Hidings
Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take...
History of Hash Function Attacks
The SHA-1 hash function, which has long been considered insecure, is now officially broken as of yesterday. Given the renewed...
Zcash Audit Results
As a security-focused team, made up of world-class talent, we prioritize the security of Zcash users. True security comes from...
Zcash Parameters And How They Will Be Generated
At its core, Zcash's privacy technology relies on a novel cryptographic tool called a zkSNARK - a small zero-knowledge proof that...
Our mission is to make the first open financial technology with zero-knowledge privacy, for every person in the world to...
Pairing cryptography in Rust
Pairing cryptography is an exciting area of research, and an essential component of Zcash's zkSNARKs — proofs that transactions are...
New Alpha Release: libzcash
Today, we deployed a new alpha release of the Zcash reference implementation, v0.11.2.z3 , to the testnet. The new release includes the...
Fixing Vulnerabilities in the Zcash Protocol
Intro by Zooko I've worked in cryptography, information security, and digital money for half of my life (20...
How To Generate SNARK Parameters Securely
There are a lot of cryptographic challenges to making a fully secure and reliable open financial system. Our current...