// ZK & CRYPTOGRAPHY
Deconstructing the 1.5 GHz zkVM: How ZisK Redefined the Limits of Trace Generation
An engineering deep dive into trace generation optimization and how ZisK pushes the boundaries of zkVM performance.
READ POST →Understanding the Winternitz One-Time Signature Scheme: A Deep Dive into Post-Quantum Cryptography
Exploring the mechanics of hash-based signature schemes and their implications for post-quantum security guarantees.
READ POST →Building Blocks of Modern Zero-Knowledge Proofs: An Engineering Perspective
A comprehensive overview of the fundamental components that make up modern ZK proof systems, from polynomials to commitments.
READ POST →Understanding Polynomial Commitment KZG using Airdrop Distribution (Part 1)
An accessible explanation of KZG commitments grounded in the practical example of airdrop claims.
READ POST →Understanding Polynomial Commitment KZG using Airdrop Distribution (Part 2)
Continuing the exploration of KZG commitments, focusing on the mechanics of polynomial evaluation and proof verification.
READ POST →The Multiset Check IOP
Formal analysis of interactive oracle proofs used for validating multiset equivalences in zero-knowledge contexts.
READ POST →The Matryoshka MLE Algorithm
Notes mapping out the mechanics of the Matryoshka Multilinear Extension algorithm for efficient proof structures.
READ POST →Jagged Multilinear Extension (Stacked MLE)
Exploration of Stacked MLE structures utilized in advanced cryptographic polynomial commitments.
READ POST →Ron's Optimization for Multilinear Extension Evaluation
An optimization strategy for efficiently evaluating multilinear extensions in proof systems.
READ POST →Multilinear Polynomial Extension and Direct Evaluation
Technical exploration of multilinear polynomials and methods for their direct evaluation.
READ POST →Lecture Notes: Fields and Extension Fields in Cryptography
Foundational lecture notes on finite fields, extension fields, and their cryptographic properties.
READ POST →The Groth16 Protocol
A deep dive into the mechanics and mathematics of the Groth16 zero-knowledge proving system.
READ POST →R1CS to QAP
Understanding the transformation from Rank-1 Constraint Systems (R1CS) to Quadratic Arithmetic Programs (QAP).
READ POST →Permutation Check Polynomial IOP
Analysis of the permutation check interactive oracle proof used within modern zk-SNARKs.
READ POST →ProductCheck Polynomial Interactive Oracle Proof
An examination of the ProductCheck argument and its role in building efficient polynomial IOPs.
READ POST →// BLOCKCHAIN & EVM
How ZK-Rollups Work After EIP-4844: From calldata to Blobs
Analyzing the architectural shifts in Layer 2 rollups following the implementation of Proto-Danksharding.
READ POST →EVM Object Format (EOF) Deep Dive
An exploration of EOF, the proposed upgrade to EVM code execution and validation rules.
READ POST →If State Read/Write Opcodes Aren't Native VM (WASM/RISC-V) Instructions, How Do Blockchains Read and Write State?
Bridging the conceptual gap between general-purpose VM instructions and blockchain specific state transitions.
READ POST →Deep Dive into Abstract Account Wallet EIP-4337
Understanding the mempool, bundlers, and entry point contracts powering account abstraction.
READ POST →Chronicle: Blockchain Indexer Built in Rust - Blazing Fast
An introduction to Chronicle, a blazing fast blockchain indexer written in Rust.
READ POST →Building EIP2771 Gasless Relayer
A technical guide on building a secure gasless relayer utilizing the EIP2771 specification for meta-transactions.
READ POST →What Does EVM's JUMPDEST Do?
A focused analysis on the JUMPDEST opcode and its critical role in EVM control flow operations.
READ POST →A Deep Dive into EIP-7928 and Block-Level Access Lists
An exploration of state access optimization through block-level access lists introduced in EIP-7928.
READ POST →Ethereum Protocol Fellowship Development Log: Project Summary
Summarized findings and logs detailing research and engineering during the Ethereum Protocol Fellowship.
READ POST →A Hybrid Ethereum: Experimenting with a RISC-V Execution Engine
Discussions and insights from building an experimental execution engine separating the EVM and RISC-V architectures.
READ POST →// DISTRIBUTED SYSTEMS & INFRASTRUCTURE
Building a Kademlia Distributed Hash Table
Engineering a Kademlia DHT from scratch, focusing on peer-to-peer node discovery and routing.
READ POST →Merkle Patricia Trie
A technical breakdown of the Merkle Patricia Trie data structure underpinning Ethereum's state storage.
READ POST →Understanding Ethereum State Trie
An accessible exploration of the Ethereum State Trie and how account balances and contract states are managed.
READ POST →