Latest Articles

  • The Encryption Trifecta

    The Encryption Trifecta

    Encrypted computation completes the trifecta: protecting data at rest, in transit, and now, during computation.

    industry
  • The Power of ProgCrypto

    The Power of ProgCrypto

    ZK, MPC & the future of programmable trust.

    industry
  • Private Proof Markets

    Private Proof Markets

    Preserving privacy in outsourced ZK proving with MPC.

    research
  • Poseidon{2} for Noir

    Poseidon{2} for Noir

    ZK-friendly hashing, implemented in Noir.

    technology
  • Hash functions in Zero Knowledge

    Hash functions in Zero Knowledge

    Why do ZK apps use Poseidon and not SHA-2/3? This post explores the evolution of ZK-friendly hash functions and their performance in proof systems.

    research