Kelly Stage
Watch live from Kelly Stage at EthCC[8]. All times are in CEST (Central European Summer Time).

Kelly Stage
Watch live from Kelly Stage at EthCC[8]. All times are in CEST (Central European Summer Time).

Stream Currently Offline
Check back during conference hours
Monday, June 30's Schedule - Kelly Stage
zkVM Proof Aggregation: From Zero to Hero


Héctor Masip Ardevol, Roger Taulé
Polygon, Polygon Labs
Proof aggregation compresses multiple proofs into one, revolutionizing proving frameworks. In this talk, I’ll show how this concept generalizes to sharding programs into smaller pieces, enabling efficient proof generation and verification in zkVMs.
zkBugs a knowledge database for ZK security

Stefanos Chaliasos
Imperial College London & zkSecurity
In this presentation, we will introduce zkBugs (https://zkbugs.com/), a database containing vulnerabilities in ZK protocols. We will further present how we have leveraged zkBugs in our research projects, but also how we can learn from past bugs.
Pico: A Modular and Performance ZKVM

Micheal
Brevis
This talk introduces Pico, a next-generation zkVM by Brevis that is modular, performant, and future-proof. It enables developers to build ZK-powered dApps using plain Rust, leveraging multiple proving backends for optimal efficiency and flexibility.
Stress-Testing zkEVM: A Deep Dive into zkEVM Prover Testing Best Practices

Leo Jeong
Linea
Testing zkEVM provers in production is critical, yet best practices are lacking. We introduce a framework using historical and synthetic traces to enhance robustness and optimize deployment, ensuring zkEVM constraints are validated with confidence.
How to reach real time proving for Ethereum in 2025

Elias Tazartes
Kakarot ZK-EVM
An analysis of how to prove the Ethereum Execution Layer in under a slot time. We'll explore how to gain precious seconds on each step of the proving workflow, from preparing prover inputs and generating a trace to generating the STARK.
Confidential ERC20 Framework: A New Primitive for Onchain Confidentiality Proposed by Inco and Circle Research

Remi Gai
Inco
I explore differences between commitment- and encryption-based solutions for confidential payment. I focus on the features an encryption-based solution could enable, like composability and the flexible programming of viewing and transferring assets.
Efficiently Signing Encrypted Transactions with FHE

Jonathan Passerat-Palmbach
Flashbots
This talk examines challenges in signing encrypted transactions with FHE for MEV mitigation, proposing solutions like Account Abstraction, Chameleon hashes, and online/offline signatures to replace the less FHE-friendly keccak and ECDSA.
Securing Cross-Chain Interactions with ZK Coprocessor: From Design to On-Chain Verification

BartolomeoDiaz
Herodotus
Explore ZK coprocessors for cross-chain data verification & modular on-chain compute, diving into design of ZK coprocessor, use cases (solvency proofs, compliance), and live demo of a bridge solvency check module, verify its STARK proof on-chain.
Leveraging AI for Automated Vulnerability Detection in Zero-Knowledge Proof Systems

mimoo
zkSecurity
We document our research into using AI to identify vulnerabilities in zero-knowledge proof systems. We share insights from experimenting with different prompting techniques—from basic methods to advanced multi-agent and chain-of-thought approaches
Building a performant and modular zkVM framework with OpenVM

Yi Sun
Axiom
We introduce OpenVM, a performant and modular zkVM framework built for customization and extensibility. OpenVM allows developers to easily use ZK without trading off performance. We will discuss the core OpenVM design and applications enabled by it.
Order Preserving Lookup arguments

Azam Soleimanian
Linea, Consensys
Lookup arguments are commonly used in proof generation by Layer 2 solutions. They assert that the elements of one vector are a subset of another vector. We focus on a special case where a bilateral order-preserving lookup is required.
An Anti-Collusion Mechanism for Threshold Encrypted Mempools

Andreas Erwig
Shutter Network
Threshold encrypted mempools (TEMs) can prevent malicious MEV extraction but crucially rely on a trust assumption, which hinders adoption in practice. This talk presents a novel solution to reduce this assumption, enabling widespread use of TEMs.
New Results and Insights into Proving Aggregation of BLS Signatures
We introduce a simple custom PLONK-ish based SNARK and we describe how it can be used to efficiently aggregate BLS signatures which are prevalent in many consensus mechanisms nowadays. We also show how to prove its security which requires O-SNARKs.
Decentralizing access to Ethereum utilizing Ethereum's Portal Networks

Kolby Moroz Liebl
Ethereum Foundation
Currently the barriers to running a full node is 2TB of storage and most users use centralized JSON-RPC providers such as Infura. What if there was a way to reduce the requirements to partipate for full nodes utilizing EIP-4444's + Portal.