CONTACT

// ZK & CRYPTOGRAPHY

Deconstructing the 1.5 GHz zkVM: How ZisK Redefined the Limits of Trace Generation

HackMDZero-Knowledge

An engineering deep dive into trace generation optimization and how ZisK pushes the boundaries of zkVM performance.

READ POST

Understanding the Winternitz One-Time Signature Scheme: A Deep Dive into Post-Quantum Cryptography

Exploring the mechanics of hash-based signature schemes and their implications for post-quantum security guarantees.

READ POST

Building Blocks of Modern Zero-Knowledge Proofs: An Engineering Perspective

A comprehensive overview of the fundamental components that make up modern ZK proof systems, from polynomials to commitments.

READ POST

Understanding Polynomial Commitment KZG using Airdrop Distribution (Part 1)

MediumCryptography

An accessible explanation of KZG commitments grounded in the practical example of airdrop claims.

READ POST

Understanding Polynomial Commitment KZG using Airdrop Distribution (Part 2)

MediumCryptography

Continuing the exploration of KZG commitments, focusing on the mechanics of polynomial evaluation and proof verification.

READ POST

The Multiset Check IOP

Formal analysis of interactive oracle proofs used for validating multiset equivalences in zero-knowledge contexts.

READ POST

The Matryoshka MLE Algorithm

Notes mapping out the mechanics of the Matryoshka Multilinear Extension algorithm for efficient proof structures.

READ POST

Jagged Multilinear Extension (Stacked MLE)

Exploration of Stacked MLE structures utilized in advanced cryptographic polynomial commitments.

READ POST

Ron's Optimization for Multilinear Extension Evaluation

An optimization strategy for efficiently evaluating multilinear extensions in proof systems.

READ POST

Multilinear Polynomial Extension and Direct Evaluation

Technical exploration of multilinear polynomials and methods for their direct evaluation.

READ POST

Lecture Notes: Fields and Extension Fields in Cryptography

Foundational lecture notes on finite fields, extension fields, and their cryptographic properties.

READ POST

The Groth16 Protocol

A deep dive into the mechanics and mathematics of the Groth16 zero-knowledge proving system.

READ POST

R1CS to QAP

Understanding the transformation from Rank-1 Constraint Systems (R1CS) to Quadratic Arithmetic Programs (QAP).

READ POST

Permutation Check Polynomial IOP

Analysis of the permutation check interactive oracle proof used within modern zk-SNARKs.

READ POST

ProductCheck Polynomial Interactive Oracle Proof

An examination of the ProductCheck argument and its role in building efficient polynomial IOPs.

READ POST

// BLOCKCHAIN & EVM

How ZK-Rollups Work After EIP-4844: From calldata to Blobs

HackMDEVM Deep Dive

Analyzing the architectural shifts in Layer 2 rollups following the implementation of Proto-Danksharding.

READ POST

EVM Object Format (EOF) Deep Dive

An exploration of EOF, the proposed upgrade to EVM code execution and validation rules.

READ POST

If State Read/Write Opcodes Aren't Native VM (WASM/RISC-V) Instructions, How Do Blockchains Read and Write State?

Bridging the conceptual gap between general-purpose VM instructions and blockchain specific state transitions.

READ POST

Deep Dive into Abstract Account Wallet EIP-4337

MediumSmart Contracts

Understanding the mempool, bundlers, and entry point contracts powering account abstraction.

READ POST

Chronicle: Blockchain Indexer Built in Rust - Blazing Fast

MediumIndexer

An introduction to Chronicle, a blazing fast blockchain indexer written in Rust.

READ POST

Building EIP2771 Gasless Relayer

HackMDERC-2771

A technical guide on building a secure gasless relayer utilizing the EIP2771 specification for meta-transactions.

READ POST

What Does EVM's JUMPDEST Do?

A focused analysis on the JUMPDEST opcode and its critical role in EVM control flow operations.

READ POST

A Deep Dive into EIP-7928 and Block-Level Access Lists

HackMDEIP-7928

An exploration of state access optimization through block-level access lists introduced in EIP-7928.

READ POST

Ethereum Protocol Fellowship Development Log: Project Summary

Summarized findings and logs detailing research and engineering during the Ethereum Protocol Fellowship.

READ POST

A Hybrid Ethereum: Experimenting with a RISC-V Execution Engine

HackMDRISC-V

Discussions and insights from building an experimental execution engine separating the EVM and RISC-V architectures.

READ POST

// DISTRIBUTED SYSTEMS & INFRASTRUCTURE

Building a Kademlia Distributed Hash Table

HackMDP2P Networking

Engineering a Kademlia DHT from scratch, focusing on peer-to-peer node discovery and routing.

READ POST

Merkle Patricia Trie

A technical breakdown of the Merkle Patricia Trie data structure underpinning Ethereum's state storage.

READ POST

Understanding Ethereum State Trie

MediumEVM Architecture

An accessible exploration of the Ethereum State Trie and how account balances and contract states are managed.

READ POST