Archives
Formal verification vs fuzzing: the showdown
A study comparing formal verification, which exhaustively checks invariants, to fuzzing, an efficien...
Nurit Dor
Optimize zkEVM throughput
We aim to introduce the language, zkASM (zk assembly), used to implement the zkEVM. Benchmarks and i...
Carlos Matallana, Ignasi Ramos
Unified EVM state capture, access and stateless re-execution
A fully trustless export, storage, re-execution of state data (with beacon blobs) for EVM blockchain...
Pranay Valson
Context-Based, Private Proof of Uniqueness
Introducing a method for privacy-preserving proof of user uniqueness in contexts like elections, usi...
Sebastian Rodriguez
A Lightweight Architecture for Ethereum Archive Nodes
The core idea is to maintain compacted, flattened, and fine-grained (i.e., transaction-level) histor...
Andy Zhou
Levelling-up your consensus protocol's testing using Attacknet
Testing a consensus protocol is hard work, and fuzzing one is even harder. We'll talk about how Atta...
Benjamin Samuels
MISERE : protecting your critical server keys
Cryptographic keys are quite vulnerable on a server because they're not linked to code unless you re...
btchip
Defying Gravity: Levitation Lifts Off with ZK-Rollups
Levitation protocol decentralizes ZK rollups by implementing a decentralized sequencer in Solidity a...
Stan Kladko