Verifying Computations Layer by Layer
Jun 1, 2025 • teddav
Get to know our resident auditors who make Electisec special
May 19, 2025 • nexus
Compressing Computation One Bit at a Time
May 1, 2025 • teddav
Folding and Merkle trees, understand the magic behind STARKs
Mar 31, 2025 • teddav
From QR codes to ZK, discover how Reed-Solomon codes correct errors and secure digital communication
Feb 24, 2025 • teddav
𝔽₂ and Beyond: A Gentle Guide to Field Extensions
Feb 13, 2025 • teddav
A small detail influencing major cryptographic libraries
Jan 14, 2025 • Oba
An analysis of the security aspects of Account Abstraction
Sep 9, 2024 • adriro
Newsflash - single points of failure can fail
Aug 19, 2024 • engn33r
Fixing a Smart Contract Security Blind Spot
Jun 14, 2024 • engn33r
Price Data is Hard - Part 1
May 24, 2024 • engn33r
Summarizing economic implications for good designs
May 3, 2024 • engn33r
Detecting Incorrect Interface Definitions (in Vyper!)
Apr 19, 2024 • engn33r