Explore talks and presentations from past EthCC events
Join us to celebrate the end of another EthCC[7] and get some Alpha on EthCC[8]
This talk is based on the zk-bug-tracker of 0xparc,aims to provide a structured approach to analyze vulnerabilities in ZKPs and offer effective security practices and mitigation strategies.
Expanding the decentralized digital services offered by blockchain protocols using AI Agents that are wallet-enabled to act onchain, thinking offchain with immutable and cryptographic guarantees of their activity
Coverage alone can't guarantee the quality of your smart contract tests. Through history and practical code examples, discover how mutation testing can evaluate their true effectiveness. Whether you're a beginner or an expert, ensure your tests are not just thorough, but robust!
We introduce a protocol for secure channel setup and decentralized communications in group chats built upon the MLS protocol. The protocol also incorporates the sign-in with Ethereum (SIWE) protocol for authentication.
Dive into the realm of anonymous verification with zero-knowledge proofs. Unveil how government signatures can authenticate identities without compromising privacy.
Remix is great for your blockchain experiments. See intros to our AI tools, ZK tools, tutorials, compilers for a host of languages, scripting tricks, our collection of templates and more! We’ll also introduce Remix Desktop. Learn to play in Remix!
Exploring the evolution of block explorers in the multichain landscape. Discover how they're building products for users and developers.
A study comparing formal verification, which exhaustively checks invariants, to fuzzing, an efficient technique to detect vulnerabilities. We evaluate bug detection, usability and performance, focusing on recent Defi protocols and critical bugs found
We aim to introduce the language, zkASM (zk assembly), used to implement the zkEVM. Benchmarks and its bottlenecks will be explained and a practical example on how to increase EVM throughput via zkASM optimitzations
A fully trustless export, storage, re-execution of state data (with beacon blobs) for EVM blockchains is critical due to EIP-4444.Presenting a unified storage and re-exec semantics for EIP-4844 implemented blob storage with EVM account/tx state data.
Introducing a method for privacy-preserving proof of user uniqueness in contexts like elections, using DIDs, ZK, and VCs, without revealing unique identifiers and compatible with multiple sources of trust.
The core idea is to maintain compacted, flattened, and fine-grained (i.e., transaction-level) historical states by flattening the minimum state changes of each transaction required for the world state.
Testing a consensus protocol is hard work, and fuzzing one is even harder. We'll talk about how Attacknet can be used to quickly fuzz protocols for edge cases using a variety of attacks that would be nearly impossible to write tests for.
Cryptographic keys are quite vulnerable on a server because they're not linked to code unless you rely on expensive dedicated hardware - the Minimal Interoperable Secure Enclave Runtime Environment project aims to change that
Levitation protocol decentralizes ZK rollups by implementing a decentralized sequencer in Solidity and running it on a fast EVM blockchain. I will discuss specification of Levitation Protocol and its implementation by SKALE network.