In this week’s episode, Anna and Kobi Gurkan speak with Dmitry Khovratovich, researcher at the Ethereum Foundation, Dusk Network, and ABDK Consulting and JP Aumasson CSO at Taurus. This episode compares symmetric and asymmetric cryptography as well as a deep dive into hash functions. They explore what hash functions are used for, the process of developing and improving hash functions, and what it means for a hash function to be zk friendly.
Here are some additional links for this episode:
- Dmitry Khovratovich Twitter
- Ethereum Foundation
- Dusk Network
- ABDK Consulting
- JP Aumasson Twitter
- JP Aumasson Website
- Taurus Twitter
- Taurus Website
- ZK8: New Directions in ZK hashing - Dmitry Khovratovich - Ethereum Foundation
- ZK8: On ZK hashes - JP Aumasson - Taurus
- ZK7: Security of ZKP projects: same but different - JP Aumasson - Taurus
- Serious Cryptography - JP Aumasson, 2017
- Too Much Crypto - JP Aumasson, 2019
- Crypto Dictionary - JP Aumasson
- Scalable, transparent, and post-quantum secure computational integrity - Ben-Sasson, Bentov, Horesh, Riabzev, 2018, page 71
- NIST National Institute of Standards and Technology
- BLAKE2
- Poseidon Network
- SHA-3
- Reinforced Concrete - Maharramov, 2021
- Nova - Recursive Zero-Knowledge Arguments from Folding Schemes -...