From a2ac59c3ae647e586688fc261df830d74a0cbadf Mon Sep 17 00:00:00 2001 From: krakhit <61501745+krakhit@users.noreply.github.com> Date: Wed, 1 May 2024 11:33:01 +0300 Subject: [PATCH] updated links --- src/applicationszk.md | 1 + src/elliptic.md | 1 + src/provingzk.md | 7 +++++++ src/vulnerabilities.md | 3 ++- 4 files changed, 11 insertions(+), 1 deletion(-) diff --git a/src/applicationszk.md b/src/applicationszk.md index d39f5b9..dbdca6a 100644 --- a/src/applicationszk.md +++ b/src/applicationszk.md @@ -95,6 +95,7 @@ A compilation of materials that showcase various applications of zk technology. - [Scaling Intelligence - Verifiable decision forest inference with remainder](https://github.com/Modulus-Labs/Papers/blob/master/remainder-paper.pdf) - [Verifiable evaluations of ML models using ZKSnarks](https://arxiv.org/abs/2402.02675) - [An overview of Decentralized inference](https://medium.com/dragonfly-research/dont-trust-verify-an-overview-of-decentralized-inference-c471a9f7a586) +- [Analysis of leading ZKML frameworks on neural networks](https://hackmd.io/@Guy1m0/B1G8YyE3a) ## ZK Gaming diff --git a/src/elliptic.md b/src/elliptic.md index e5a01c0..715d4f3 100644 --- a/src/elliptic.md +++ b/src/elliptic.md @@ -49,6 +49,7 @@ - [optimizing emulated pairings](https://hackmd.io/@ivokub/SyJRV7ye2) - [Estimating the bit security of pairing friendly curves](https://research.nccgroup.com/2022/03/02/estimating-the-bit-security-of-pairing-friendly-curves/) - [optimizing pairing based cryptography, montgomery arithmetic in rust](https://research.nccgroup.com/2021/06/09/optimizing-pairing-based-cryptography-montgomery-arithmetic-in-rust/) +- [On proving pairings - Eagen and Novakovic](https://eprint.iacr.org/2024/640) ## Specific curves diff --git a/src/provingzk.md b/src/provingzk.md index 459aa14..cd81456 100644 --- a/src/provingzk.md +++ b/src/provingzk.md @@ -43,6 +43,10 @@ - [Circle STARKS](https://eprint.iacr.org/2024/278) - [STIR: Reed–Solomon Proximity Testing with Fewer Queries](https://eprint.kobi.one/2024/390) +## Permutation arguments + +- [PLonk's permutation - a definitive explanation](https://www.cryptologie.net/article/610/plonks-permutation/) + ## Lookup arguments - [A brief history of lookup arguments](https://github.com/ingonyama-zk/papers/blob/main/lookups.pdf) @@ -54,6 +58,7 @@ - [blog](https://research.protocol.ai/blog/2021/snarkpack-how-to-aggregate-snarks-efficiently/) - [talk](https://www.esat.kuleuven.be/cosic/blog/rwc-2022-snarkpack-practical-snark-aggregation/) - [talk](https://docs.zkproof.org/pages/standards/slides-w4/SNARKpack.pdf) +-[Proof aggregation techniques - lambdaclass](https://blog.lambdaclass.com/proof-aggregation-techniques/) ## Folding and accumulation schemes @@ -66,3 +71,5 @@ ## General - [Succinct Proofs and Linear Algebra](https://angeris.github.io/papers/zk-linalg.pdf) +- [SOK: Range proofs](https://eprint.iacr.org/2024/430) + diff --git a/src/vulnerabilities.md b/src/vulnerabilities.md index 8c11730..d6a29c7 100644 --- a/src/vulnerabilities.md +++ b/src/vulnerabilities.md @@ -27,4 +27,5 @@ Potential vulnerabilities and security in ZK systems - [Threshold signature pitfalls](https://www.jcraige.com/dangers-of-determinism-in-threshold-signatures) - [VSS forgery](https://www.jcraige.com/vss-forgery) - [Boomerang values in ZK](https://www.zksecurity.xyz/blog/posts/boomerang/) -- [GPUz.zip Sidechannel attacks on GPUs](https://www.hertzbleed.com/gpu.zip/) \ No newline at end of file +- [GPUz.zip Sidechannel attacks on GPUs](https://www.hertzbleed.com/gpu.zip/) +- [Last challenge attack](https://eprint.iacr.org/2024/398) \ No newline at end of file