<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[ZK Mesh]]></title><description><![CDATA[A monthly newsletter sharing the latest in decentralised privacy-preserving technologies, privacy protocol development and Zero Knowledge systems]]></description><link>https://zkmesh.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!DOFj!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fzkmesh.substack.com%2Fimg%2Fsubstack.png</url><title>ZK Mesh</title><link>https://zkmesh.substack.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 19 May 2026 11:38:10 GMT</lastBuildDate><atom:link href="https://zkmesh.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[ZK Mesh]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[zkmesh@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[zkmesh@substack.com]]></itunes:email><itunes:name><![CDATA[Zero Knowledge Podcast]]></itunes:name></itunes:owner><itunes:author><![CDATA[Zero Knowledge Podcast]]></itunes:author><googleplay:owner><![CDATA[zkmesh@substack.com]]></googleplay:owner><googleplay:email><![CDATA[zkmesh@substack.com]]></googleplay:email><googleplay:author><![CDATA[Zero Knowledge Podcast]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Addendum: TEEs]]></title><description><![CDATA[This month, we&#8217;re sharing our addendum on TEEs.]]></description><link>https://zkmesh.substack.com/p/addendum-tees</link><guid isPermaLink="false">https://zkmesh.substack.com/p/addendum-tees</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Tue, 19 May 2026 07:34:13 GMT</pubDate><content:encoded><![CDATA[<p>This month, we&#8217;re sharing our addendum on TEEs.</p><p>It&#8217;s a human-curated one-pager featuring some of the latest research, implementations, and initiatives in this technology adjacent to ZK.</p><p>Stay tuned for more.</p><p>We hope you enjoy it!</p><p>Cheers,</p><p>The zkMesh+ Team</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Tees Addendum</div><div class="file-embed-details-h2">122KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://zkmesh.substack.com/api/v1/file/5449fa8f-5ce0-44d1-9542-aa60ade6dd07.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://zkmesh.substack.com/api/v1/file/5449fa8f-5ce0-44d1-9542-aa60ade6dd07.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p> </p>
      <p>
          <a href="https://zkmesh.substack.com/p/addendum-tees">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[zkMesh: April 2026 recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly human-curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zkmesh-april-2026-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zkmesh-april-2026-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Thu, 30 Apr 2026 19:38:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b0639d2d-1ac1-467c-b5d8-acc035625ff2_1400x1066.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly human-curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research. Below we share recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events in the ZK space and beyond! </p><div><hr></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2026/683">VEIL: Lightweight Zero-Knowledge for Hash-Based Multilinear Proof Systems</a> | Rahul Dalal, Tamir Hemo, Eugene Rabinovich and Ron Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2026/694">Proximity Signatures</a> | Guillermo Angeris and Kobi Gurkan</p></li><li><p><a href="https://eprint.iacr.org/2026/680">Open Problems In List Decoding and Correlated Agreement</a> | Gal Arnon, Dan Boneh and Giacomo Fenzi</p></li><li><p><a href="https://ieeexplore.ieee.org/document/11462079">ZK-VSA: Zero-Knowledge Verifiable Speaker Anonymization Leveraging Phase Vocoder with Time-Scale Modification</a> | Shuang Liang, Yang Hua, Peishen Yan, Linshan Jiang, Tao Song, and Bin Yao</p></li><li><p><a href="https://eprint.iacr.org/2026/762">The Sum-Check Protocol Over the Monomial Basis, and Other Optimizations</a> | Quang Dao, Ari Biswas, Liam Eagen, Andrew Milson, Shahar Papini and Justin Thaler</p></li><li><p><a href="https://eprint.iacr.org/2026/674">Efficient Batch Threshold Encryption Using Partial Fraction Techniques</a> | Dan Boneh, Rohit Nema, Arnab Roy and Ertem Nusret Tas</p></li><li><p><a href="https://eprint.iacr.org/2026/641">HyperVerITAS: Verifying Image Transformations at Scale On Boolean Hypercubes</a> | Garrett Greiner, Toshi Mowery and Pratik Soni</p></li><li><p><a href="https://eprint.iacr.org/2026/637">VeriRAG: Efficient Zero-Knowledge Proofs for Verifiable Retrieval-Augmented Generation</a> | Chenqi Lin, Yubo Cui, Zhelei Zhou, Cheng Hong, Yufei Wang, Zhaohui Chen and Meng Li</p></li><li><p><a href="https://eprint.iacr.org/2026/634">PlasmaBlind: A Private Layer 2 With Instant Client-Side Proving</a> | Pierre Daix-Moreux and Chengru Zhang</p></li><li><p><a href="https://eprint.iacr.org/2026/662">Verifiable Divide-and-Conquer</a> | Omer Paneth and Rafael Pass</p></li><li><p><a href="https://eprint.iacr.org/2026/691">PipeSC: A Resource-efficient and Pipelined Hardware Accelerator for Sumcheck Protocol</a> | Kaixuan Wang, Yifan Yanggong, Xiaoyu Yang, Chenti Baixiao and Lei Wang</p></li><li><p><a href="https://eprint.iacr.org/2026/686">Secure MSM Outsourcing Computation for Zero-knowledge Proof Generation</a> | Wujie Xiong, Arefeh Rahaei, Sangwon Shin, Xinxin Fan, Taeweon Suh, Veronika Kuchta, Sica Francesco, Weidong Shi and Lei Xu</p></li><li><p><a href="https://eprint.iacr.org/2026/782">Failure of Proximity Gaps Close to Capacity</a> | Dmitry Krachun, Stepan Kazanin and Ulrich Hab&#246;k</p></li><li><p><a href="https://eprint.iacr.org/2026/709">zkRAG: Efficiently Proving RAG Retrieval In Zero Knowledge</a> | Yanze Jiang, Xinyang Yang, Xuanming Liu, Yanpei Guo and Jiaheng Zhang</p></li><li><p><a href="https://eprint.iacr.org/2026/718">Zero-Knowledge Proof of Progress: Secure Multi-Phase CTF Competitions</a> | Salam Khanji, Behzad Abdolmaleki, John Clark and Aryan Pasikhani</p></li><li><p><a href="https://eprint.iacr.org/2026/729">Code-based Scalable Collaborative SNARKs</a> | Christodoulos Pappas, Dimitrios Papadopoulos and Charalampos Papamanthou</p></li><li><p><a href="https://eprint.iacr.org/2026/755">ACTS: Attestations of Contents In TLS Sessions</a> | Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti and Marco Zecchini</p></li><li><p><a href="https://eprint.iacr.org/2026/788">Secret-Carrying Puzzles and Garbled Circuits Optimized for Zero-knowledge Proofs</a> | Debasish Ray Chawdhuri and Manoj Prabhakaran</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://blog.zksecurity.xyz/posts/tensor-reductions-1/">Sum-Check as an Algebraic Tensor Reduction: Part I</a> | ZK Security</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/pudding-9-zk-bitcoin/">ZK on Bitcoin &#8212; Proof is in the Pudding #9</a> | ZK Security</p></li><li><p><a href="https://ethresear.ch/t/frame-transactions-and-the-three-gates-to-privacy/24666/1">Frame Transactions and the Three Gates to Privacy</a> | Nero_eth</p></li><li><p><a href="https://ggutoski.github.io/shielded-csv-tachyon/">Insights for Shielded CSV from Tachyon</a> | Gus Gutoski</p></li><li><p><a href="https://blog.theinterfold.com/verifiability-in-the-coordination-trilemma/">Verifiability in the Coordination Trilemma</a> | The Interfold</p></li><li><p><a href="https://scottaaronson.blog/?p=9665">Scott Aaronson: On the Google Quantum Computing Paper</a> | Scott Aaronson</p></li><li><p><a href="https://blog.trailofbits.com/2026/04/17/we-beat-googles-zero-knowledge-proof-of-quantum-cryptanalysis/">We beat Google&#8217;s zero-knowledge proof of quantum cryptanalysis</a> | Trail of Bits</p></li><li><p><a href="https://x.com/CalBlockchain/status/2041295851864367439">A Mathematical Introduction to Lattice Cryptography: The Quantum Security Solution</a> | CalBlockchain</p></li><li><p><a href="https://ethereum-magicians.org/t/erc-fhe-computation-verification-standard-trustless-verification-of-encrypted-computation-via-recursive-zk-proofs/28217">ERC: FHE Computation Verification Standard &#8212; Trustless verification of encrypted computation via recursive ZK proofs</a> | Valisthea</p></li><li><p><a href="https://hashcloak.com/blog/understanding-the-ultrahonk-verifier?utm_source=X&amp;utm_medium=organic&amp;utm_campaign=zktls-aztec">Understanding the Ultrahonk Verifier</a> | HashCloak</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://x.com/zksecurityxyz/status/2039659061105352947">Proof is in the Pudding #9 &#8212; ZK on Bitcoin (with Archetype)</a> | zksecurityXYZ</p></li><li><p><a href="https://youtu.be/_lUtt8AywwY?si=pGmzKMClfYiUW82g">Verifiable Databases with Shyam &amp; Emanuele from Provably</a> | ZK Podcast</p></li><li><p><a href="https://youtu.be/C34jG0RivHY?si=N_mFOV5AqLKVXXnX">Is ZK dead? Or has it just begun? with the ZK Pod co-hosts</a> | ZK Podcast</p></li><li><p><a href="https://youtu.be/3PzymjVBUJI?si=hmDeGf91W1KM2Wk-">Dev Ojha on the Osmosis Story and his Return to Privacy</a> | ZK Podcast</p></li><li><p><a href="https://youtu.be/INL05J20K9Q?si=FTzekTsUgJInVyua">Fireside Chat with Jordi on EEZ I Jordi Baylina &amp; Kartik Talwar</a> | EthGlobal</p></li><li><p><a href="https://youtu.be/cQIPG_J1W9g?si=EDPUQVXIrFdu5e1p">How to Build Private Smart Contracts on Aztec for Solidity Developers</a> | Aztec</p></li><li><p><a href="https://x.com/i/broadcasts/1mxPaLnDkWXKN">Guardian Live: Present &amp; Future Use Cases</a> | Miden</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://rareskills.io/post/inverse-number-theoretic-transform">The Inverse Number Theoretic Transform</a> | RareSkills</p></li><li><p><a href="https://hashcloak.com/blog/a-tutorial-on-building-a-merkle-tree-air-script-in-plonky3">A tutorial on building a merkle tree AIR script in Plonky3</a> | HashCloak</p></li><li><p><a href="https://medium.com/@umitaygul/the-grand-comparison-every-zkp-system-every-dimension-article-8-of-the-zkp-systems-series-9b10dae918df">The Grand Comparison: Every ZKP System, Every Dimension &#8212; ZKP Systems Series</a> | &#220;mit Ayg&#252;l</p></li><li><p><a href="https://forum.zcashcommunity.com/t/protocol-study-series-12-session-guided-reading-of-the-zcash-protocol-specification-starting-april-21/55350">Protocol Study Series: 12-session guided reading of the Zcash Protocol Specification</a> | Mark H</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://x.com/asanso/status/2039388191124251029">Dropping a new testnet for post-quantum signatures &#8212; Falcon + ephemeral PQ scheme</a> | asanso</p></li><li><p><a href="https://blog.lambdaclass.com/introducing-spawned-erlang-style-actors-for-rust/">Introducing Spawned: Erlang-Style Actors for Rust</a> | Lambda Class</p></li><li><p><a href="https://forum.zcashcommunity.com/t/building-an-open-source-zcash-hardware-wallet-sdk-for-constrained-embedded-systems/55259">Building an open-source Zcash hardware wallet SDK for constrained embedded systems</a> | ZecVault</p></li><li><p><a href="https://forum.zcashcommunity.com/t/zecvault-a-goal-based-savings-wallet-built-on-zcash-shielded-transactions/55464">ZecVault: goal-based savings wallet on Zcash shielded transactions</a> | Gorusys</p></li><li><p><a href="https://github.com/Barnadrot/zk-autoresearch">zk-autoresearch &#8212; autonomous LLM agent optimizing a production ZK prover</a> | Barnadrot</p></li><li><p><a href="https://github.com/eu-digital-identity-wallet/av-lib-android-zkp-age-icao/blob/main/av-zkp-icao/src/main/java/eu/europa/ec/av/zkp/icao/internal/ZkpProver.kt">EU ZK ID project picked Noir</a> | eu-digital-identity-wallet</p></li><li><p><a href="https://ethereum-magicians.org/t/ultrafastsecp256k1-a-multi-backend-secp256k1-execution-engine-for-wallets-zk-and-high-throughput-ethereum-tooling/28358">UltrafastSecp256k1: a multi-backend secp256k1 execution engine for wallets, ZK, and high-throughput Ethereum tooling</a> | Vano Chkheidze</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://forum.zcashcommunity.com/t/zebra-4-3-1-critical-security-fixes-dockerized-mining-and-ci-hardening/55389">Zebra 4.3.1: Critical Security Fixes, Dockerized Mining and CI Hardening</a> | Zcash Foundation</p></li><li><p><a href="https://x.com/ah_p_uh/status/2049510574216954338">Critical soundness bug from Jolt zkVM</a> | Minsun Kim</p></li><li><p><a href="https://arxiv.org/abs/2604.09724">Proximity Gaps Conjecture Fails Near Capacity over Prime Fields</a> | Antonio Kambir&#233;</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/labrador-bugs/">Soundness Failures in LaBRADOR Implementations from NTT -Friendly Rings</a> | zkSecurity</p></li><li><p><a href="https://x.com/schaliasosvons/status/2049065379347968403">New Circom Bugs</a> | Stefanos Chaliasos</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://x.com/elibensasson/status/2046925628591468852">All blockchains should have a clear path toward post-quantum security</a> | Starknet</p></li><li><p><a href="https://x.com/zkdragon/status/2042639639144505703">People don&#8217;t understand the sheer volume of what is shipping in Zcash 2026</a> | Zcash</p></li><li><p><a href="https://x.com/arjunkhemani/status/2044396084626407918">Zcash roadmap to becoming Post-Quantum</a> | Zcash</p></li><li><p><a href="https://x.com/0xMiden/status/2047299476088365237">Introducing Guardian: The Missing Piece for Institutional Privacy</a> | Miden</p></li><li><p><a href="https://www.openzeppelin.com/news/private-state-management-on-miden">Private State Management on Miden</a>  | OpenZeppelin</p></li><li><p><a href="https://github.com/succinctlabs/sp1/pull/2698">SP1 Verifier: WASM-compatible PLONK &amp; GROTH16 verification</a> | Succinct</p></li><li><p><a href="https://x.com/SuccinctLabs/status/2047346557222056154">Zcam: an iPhone camera app to Prove What&#8217;s Real </a>| Succinct</p></li><li><p><a href="https://blog.succinct.xyz/google-sp1-quantum-threat/">Google Uses SP1 to Prove Quantum Security Threat</a> | Succinct</p></li><li><p><a href="https://www.blog.citrea.xyz/post-quantum-citrea/">Post-Quantum Citrea</a> | Citrea</p></li><li><p><a href="https://blog.lambdaclass.com/finality-in-leanconsensus-how-ethlambda-implements-3sf-mini/">Finality In Leanconsensus: How Ethlambda Implements 3SF-mini</a> | Lambda Class</p></li><li><p><a href="https://reports.zksecurity.xyz/reports/aptos-confidential-assets/">Audit of Aptos Confidential Assets</a> | Aptos &amp; zkSecurity</p></li><li><p><a href="https://aztec.network/blog/just-write-if-why-payy-left-halo2-for-noir">Just write &#8216;if&#8217;: Why Payy left Halo2 for Noir</a> | Aztec / Payy</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><strong><a href="https://www.zksummit.com/">zkSummit14</a> | Rome, Italy &#8212; May 7</strong> </p></li><li><p><a href="https://zfnd.org/zcash-dev-summits/">Zcash Dev Summit</a> | Rome, Italy &#8212; May 8 </p></li><li><p><a href="https://zkproof.org/events/zkproof-8-rome/">Zkproof 8</a> | Rome, Italy &#8212; May 9 - 10</p></li><li><p><a href="https://www.ethdam.com/">ETHDam</a> | Amsterdam, Netherlands &#8212; May 9 - 10 </p></li><li><p><a href="https://www.petsymposium.org/2026/index.php">Privacy Enhancing Technologies Symposium</a> | Calgary, Canada &#8212; July 20 - 25</p></li><li><p><a href="https://luma.com/commons3nse">Common S3nse</a> | Amsterdam, Netherlands &#8212; Sept 4</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a> | Mumbai, India &#8212; Q4 2026 &#8203;&#8203;</p><p></p></li></ul><div><hr></div><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">To support our work, consider becoming a free or zkmesh+ paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[State of ZK - Q1 2026]]></title><description><![CDATA[Q1 2026 State of ZK is live.]]></description><link>https://zkmesh.substack.com/p/state-of-zk-q1-2026</link><guid isPermaLink="false">https://zkmesh.substack.com/p/state-of-zk-q1-2026</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Fri, 24 Apr 2026 20:12:33 GMT</pubDate><content:encoded><![CDATA[<p>Q1 2026 State of ZK is live.</p><p>This quarter we saw lattice folding advancing quite a bit, an uptick on production infra , and the first real exploits against live ZK circuits, all at the implementation layer, not the cryptography.</p><p>Full report attached.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">*ebook State Of Zk Q1 26</div><div class="file-embed-details-h2">2.44MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://zkmesh.substack.com/api/v1/file/fcf0922a-eb6f-486d-91e0-9038609da678.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://zkmesh.substack.com/api/v1/file/fcf0922a-eb6f-486d-91e0-9038609da678.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p>P.S. A subscriber-only addendum on TEEs is coming next. Stay tuned. </p>
      <p>
          <a href="https://zkmesh.substack.com/p/state-of-zk-q1-2026">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[zkMesh: March 2026 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly human-curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zkmesh-march-2026-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zkmesh-march-2026-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Tue, 31 Mar 2026 16:02:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2bbec939-3811-42c6-9988-3117dc28221b_2280x578.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly human-curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research. Below we share recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events in the ZK space and beyond!</p><p>** <strong>zkSummit14 will take place on 7 May 2026 in Rome. Submit your application to attend <a href="https://www.zksummit.com/">here</a>!</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">To support our work, consider becoming a free or zkmesh+ paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h4>Research</h4><ul><li><p><a href="https://quantumai.google/static/site-assets/downloads/cryptocurrency-whitepaper.pdf">Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations</a> | Ryan Babbush, Adam Zalcman, Craig Gidney, Michael Broughton, Tanuj Khattar, Hartmut Neven, Thiago Bergamaschi, Justin Drake, Dan Boneh</p></li><li><p><a href="https://eprint.iacr.org/2026/448">Interactive Proofs for Batch Polynomial Evaluation</a> | Gal Arnon, Alessandro Chiesa, Giacomo Fenzi and Eylon Yogev</p></li><li><p><a href="https://eprint.iacr.org/2026/463">Icefish: Practical zk-SNARKs for Verifiable Genomics</a> | Alexander Frolov, Maurice Shih, Rob Patro and Ian Miers</p></li><li><p><a href="https://eprint.iacr.org/2026/525">SoK: Understanding zkVM: From Research to Practice</a> | Yunbo Yang, Yuejia Cheng, Haibo Tang, Guomin Yang, Bingsheng Zhang and Kui Ren</p></li><li><p><a href="https://eprint.iacr.org/2026/563">Optimizing FROST for Message Capacity</a> | Philipp Jovanovic, Ben Riva and Arnab Roy</p></li><li><p><a href="https://eprint.iacr.org/2026/574">A Universal Blinder: One-round Blind Signatures From FHE</a> | Dan Boneh and Jaehyung Kim</p></li><li><p><a href="https://eprint.iacr.org/2026/380.pdf">Lattice HD Wallets: Post-Quantum BIP32 Hierarchical Deterministic Wallets from Lattice Assumptions</a> | Conor Deegan, James Fitzwater, Kamil Doruk Gur, David Nugent</p></li><li><p><a href="https://robinlinus.com/binohash.pdf">Binohash: Transaction Introspection Without Softforks</a> | Robin Linus</p></li><li><p><a href="https://eprint.iacr.org/2026/532">S-two Whitepaper</a> | Dan Carmon, Lior Goldberg, Ulrich Hab&#246;ck, Leonardo Lerer and Ilya Lesokhin</p></li><li><p><a href="https://eprint.iacr.org/2026/590">On the Security of Constraint-Friendly Map-to-Curve Relations</a> | Youssef El Housni and Benedikt B&#252;nz</p></li><li><p><a href="https://eprint.iacr.org/2026/587">Speeding Up Sum-Check Proving (Extended Version)</a> | Quang Dao, Zachary DeStefano, Suyash Bagad, Yuval Domb and Justin Thaler</p></li><li><p><a href="https://eprint.iacr.org/2026/458">The Art of Linearization: From a KZG&#8217;s Trick to a General Commitment Framework</a> | Janno Siim</p></li><li><p><a href="https://eprint.iacr.org/2026/575">RoKoko: Lattice-based Succinct Arguments, a Committed Refinement</a> | Michael Klooss, Russell W. F. Lai, Ngoc Khanh Nguyen, Micha&#322; Osadnik and Lorenzo Tucci</p></li><li><p><a href="https://eprint.iacr.org/2026/538">Proof-Carrying Data Via Holography Accumulation</a> | Nikitas Paslis, Carla R&#224;fols and Alexandros Zacharakis</p></li><li><p><a href="https://github.com/succinctlabs/sp1/blob/rdalal/veil/slop/crates/veil/paper/veil.pdf">VEIL: Lightweight Zero-Knowledge for Hash-Based Multilinear Proof Systems</a> | Rahul Dalal, Tamir Hemo, Eugene Rabinovich, and Ron D. Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2026/460">A Resource-Efficient Hardware Accelerator for Large-Size NTT Via Algorithm&#8211;Architecture Co-Design</a> | Kaixuan Wang, Yifan Yanggong, Xiaoyu Yang, Chenti Baixiao and Lei Wang</p></li><li><p><a href="https://eprint.iacr.org/2026/510">FHorgEt: A Cryptographic Solution for Secure Machine Unlearning</a> | David Balb&#225;s, Dario Fiore, Georgios Raikos, Damien Robissout and Claudio Soriente</p></li><li><p><a href="https://eprint.iacr.org/2026/513">zkBSA: Auditable and Compliant Stealth Addresses for Blockchains</a> | Siyuan Zheng and Zhe Han</p></li><li><p><a href="https://eprint.iacr.org/2026/511">Human-Extractable ZK Proofs of Knowledge: A Solution to Dark DAOs</a> | Zeyuan Yin, Leiyuan Tian, Bingsheng Zhang and Kui Ren</p></li><li><p><a href="https://eprint.iacr.org/2026/562">New Approaches to Zero-Knowledge SNARG Constructions</a> | Chaya Ganesh and Mor Weiss</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://x.com/drakefjustin/status/2038847732152996108?s=46&amp;t=iTk_7aG-TA_WGaSvApUn0A">Comments on two breakthrough papers on quantum computing and cryptography</a> | Justin Drake</p></li><li><p><a href="https://ethresear.ch/t/what-if-post-quantum-ethereum-doesn-t-need-signatures-at-all/24427">What if post-quantum Ethereum doesn&#8217;t need signatures at all?</a> | 0xjasonw</p></li><li><p><a href="https://ethresear.ch/t/post-quantum-threats-to-ethereum-privacy/24450/1">Post-Quantum Threats to Ethereum Privacy</a> | namnc</p></li><li><p><a href="https://x.com/tcoratger/status/2035473660148871287">The Roadmap to Lean Ethereum</a> | Thomas Coratger</p></li><li><p><a href="https://ethresear.ch/t/revisiting-falcon-signature-aggregation-for-pq-mempools/24431/1">Revisiting Falcon signature aggregation for PQ mempools</a> | Antonio Sanso, Thomas Thiery, Benedikt Wagner</p></li><li><p><a href="https://x.com/akhtariev/status/2029990470177460237">Why encryption alone will not protect your vote</a> | Roman</p></li><li><p><a href="https://x.com/kleffew94/status/2033933477423550673">ZK proofs, x402, and Fairer Internet Markets</a> | Kevin Leffew</p></li><li><p><a href="https://x.com/luhelminger/status/2033235089270935847">Agents Need Private, Verifiable Actions at Scale. No Current Infrastructure Delivers That.</a> | Lukas Helminger</p></li><li><p><a href="https://encryptorium.medium.com/post-quantum-zk-is-an-architecture-problem-49c0694f03e9">Post-Quantum ZK is an Architecture Problem</a> | Encryptorium</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/pcs-survey/">KZG vs IPA vs FRI: Picking the Right Polynomial Commitment Scheme</a> | zkSecurity</p></li><li><p><a href="https://ethereum-magicians.org/t/frame-transactions-vs-schemedtransactions-for-post-quantum-ethereum/28056">Frame Transactions vs. SchemedTransactions for Post-Quantum Ethereum</a> | Giulio rebuffo</p></li><li><p><a href="https://ethereum-magicians.org/t/eip-8182-private-eth-and-erc-20-transfers/27889">Private ETH and ERC-20 Transfers</a> | Tom Lehman</p></li><li><p><a href="https://x.com/EliBenSasson/status/2037146095197843961">AI, ZK, and Blockchain: Use cases I believe in</a> | Eli Ben-Sasson</p></li><li><p><a href="https://x.com/gluk64/status/2037613072521842734">A response to Canton claims about ZKPs</a> | Alex Gluchowski</p></li><li><p><a href="https://x.com/akhtariev/status/2038462108468416751">Scaling Privacy: Evolving Nullifiers </a>| Roman</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://youtu.be/7Jxq3YU8GUY?si=I5Ar4SHxM3bTRBe6">Ethproofs Call #8 - Poseidon</a> | Ethproofs</p></li><li><p><a href="https://youtu.be/v8SGKS3T-3A?si=uVlzwbHOQ4zHk_2m">lean Ethereum Part 3: Security of PQ SNARKs and an update about the Proximity Prize</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://youtu.be/YWkyvTrwtQU?si=JFtenMbIfuqokFYN">lean Ethereum Part 4: leanVM, a Custom VM for Signature Aggregation</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://youtu.be/Ul2bs8INF0k?si=NVImAzj8UsFtOkLz">lean Ethereum Part 5: Devnets &amp; Upgrade Coordination with Will &amp; Ra&#250;l</a>  | Zero Knowledge Podcast</p></li><li><p><a href="https://youtu.be/9u4fu7TiZCA?si=3-ZthBSL0XOgTi9X">lean Ethereum Part 6: Formal Verification with Alex Hicks</a> | Zero Knowledge Podcast</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://x.com/jacobeverly/status/2035050214403211668">AnyFeed: ZK-verified price feeds for any token with a DEX pool</a> | Jacob Everly</p></li><li><p><a href="https://github.com/privacy-ethereum/pse-vibecoding-hackathon">PSE Vibecoding Hackathon Results</a> | PSE</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/Plonky3/Plonky3/pull/1379">WHIR implementation to Plonky3</a> | Thomas Coratger</p></li><li><p><a href="https://x.com/RobinSalen/status/2031388330412355997">New Plonky3 release</a> | Robin Salen</p></li><li><p><a href="https://x.com/ethrex_client/status/2037929626316472493">Optional Execution Proofs) in EthRex client</a> | EthRex</p></li></ul><h4> Vulnerabilities</h4><ul><li><p><a href="https://x.com/robustdragon/status/2038598486921277613?s=20">Critical vulnerability in Zcash Foundation&#8217;s Zebra node</a> | robustfengbin</p></li><li><p><a href="https://aztec.network/blog/critical-vulnerability-in-alpha-v4">Critical Vulnerability in Alpha v4</a> | Aztec Network</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://aztec.network/blog/announcing-the-alpha-network">Announcing the Alpha Network</a> | Aztec Network</p></li><li><p><a href="https://x.com/etheconomiczone/status/2038271122907578375">The Ethereum Economic Zone</a> | ZisK &amp; Gnosis</p></li><li><p><a href="https://x.com/LineaBuild/status/2038265142509547684">Linea is moving to RISC-V</a> | Linea</p></li><li><p><a href="https://x.com/ben_a_adams/status/1970439999314149712">Building ZK Proofs for Ethereum With Nethermind Client </a>| Nethermind</p></li><li><p><a href="https://x.com/eth_proofs/status/2034337406414151690">Ethproofs v3.2 is Live</a> | Ethproofs</p></li><li><p><a href="https://eprint.iacr.org/2026/474">Scalable Compliant Privacy On Starknet</a> | Lior Goldberg, Maya Dotan, Ittay Dror, Gideon Kaempfer, Nir Levi, Noa Oved, Arad Reder, Anat Veredgorn and Noa Wolfgor</p></li><li><p><a href="https://aztec.network/blog/aztec-network-roadmap-update">Aztec Network: Roadmap Update</a> | Aztec Network</p></li><li><p><a href="https://x.com/alinush/status/2036489582582140986">Aptos Confidencial Assets: A cryptographic deep dive</a> | Alin Tomescu, Aptos</p></li><li><p><a href="https://x.com/jswihart/status/2035909740920971660">ZODL update on Zcash</a> | ZODL</p></li><li><p><a href="https://x.com/powdr_labs/status/2033937297314402504">powdr-wasm release</a> | powdr labs</p></li><li><p><a href="https://x.com/Starknet/status/2032079305363058785">STRK20s Technical Paper</a> | StarkNet</p></li><li><p><a href="https://x.com/StarkWareLtd/status/2037194917810733438">S-Two Paper</a> | Starknet</p></li><li><p><a href="https://blog.brevis.network/2026/03/09/brevis-vera-proving-whats-real-in-the-age-of-ai/">Brevis Vera: Proving What&#8217;s Real In the Age of AI</a> | Brevis</p></li><li><p><a href="https://blog.hyli.org/privacy-layer/">How Privacy Layers Make Blockchain Work for Regulated Finance</a> | Hyl&#233;</p></li><li><p><a href="https://blog.ethereum.org/en/2026/03/13/ef-mandate">The Promise of Ethereum: Introducing the EF Mandate</a> | Ethereum Foundation</p></li><li><p><a href="https://blog.lambdaclass.com/how-ethrex-heals-state-during-snap-sync/">How Ethrex Heals State During Snap Sync</a> | Lambda Class</p></li><li><p><a href="https://core.taceo.io/articles/taceo-network/">The TACEO Network Is Live</a> | TACEO</p></li><li><p><a href="https://blog.ethereum.org/en/2026/03/23/l1-l2-ethereum">How L1 and L2s Can Build the Strongest Possible Ethereum</a> | Ethereum Foundation</p></li><li><p><a href="https://blog.spacecomputer.io/verifying-true-randomness-in-cryptographic-systems/">Verifying True Randomness in Cryptographic Systems</a> | Spacecomputer</p></li><li><p><a href="https://x.com/rathfinance/status/2036057902679728250">Tachyon is live on mainnet</a> | Rath</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9 &#8211; 11</p></li><li><p><a href="https://www.meetup.com/ethereum-dev-nl/events/313023736/">Privacy on Ethereum MeetUp</a> | Amsterdam, Netherlands. February 5</p></li><li><p><a href="https://www.zksummit.com/">zkSummit 14</a> | Rome, Italy. May 7</p></li><li><p><a href="https://zfnd.org/zcash-dev-summits/">Zcash Dev Summit</a> | Rome, Italy. May 8</p></li><li><p><a href="https://www.ethdam.com/">ETHDam</a> | Amsterdam, Netherlands. May 9 - 10</p></li><li><p><a href="https://zkproof.org/events/zkproof-8-rome/">Zkproof 8</a>| Rome, Italy. May 9 - 10</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt 2026</a> | Rome, Italy. May 10 - 14</p></li><li><p><a href="https://luma.com/commons3nse">Common S3nse</a> | Amsterdam, Netherlands. Sept 4</p></li><li><p><a href="https://www.petsymposium.org/2026/index.php">Privacy Enhancing Technologies Symposium</a> | Calgary, Canada. July 20&#8211;25</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a> | Mumbai, India. Q4 2026 &#8203;&#8203;</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">To support our work, consider becoming a free or zkMesh+ paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Addendum: FHE]]></title><description><![CDATA[Last month, we shared our first addendum on Post-Quantum Cryptography and opened a poll to gather feedback on which adjacent technology to ZK you would like us to explore this month.]]></description><link>https://zkmesh.substack.com/p/addendum-fhe</link><guid isPermaLink="false">https://zkmesh.substack.com/p/addendum-fhe</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Tue, 17 Mar 2026 17:35:46 GMT</pubDate><content:encoded><![CDATA[<p>Last month, we shared our first addendum on Post-Quantum Cryptography and opened a poll to gather feedback on which adjacent technology to ZK you would like us to explore this month.</p><p>Although TEEs came in first place, we didn&#8217;t find enough relevant content to share in that area, so we decided to compile this month&#8217;s addendum around FHE, which you will find below.</p><p>For next month, we will work on a TEEs addendum. If there still isn&#8217;t enough content, we will explore iO or MPC instead.</p><p>Stay tuned, as we will be sharing The State of ZK Report in mid-April.</p><p>We hope you enjoy it!</p><p>Cheers,</p><p>The zkMesh+ Team</p>
      <p>
          <a href="https://zkmesh.substack.com/p/addendum-fhe">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[zkMesh: February 2026 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zkmesh-february-2026-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zkmesh-february-2026-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Fri, 27 Feb 2026 18:45:14 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/96126685-3dfe-4582-ac99-a28a72282240_924x708.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly human-curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research. Below we share recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events in the ZK space and beyond!</p><p>** <strong>zkSummit14 will take place on 7 May 2026 in Rome. Space is limited. If you&#8217;re planning to attend or speak, please submit your application as soon as possible <a href="https://www.zksummit.com/">here</a>.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">ZK Mesh is a reader-supported publication. Subscribe and join the paid tier to get access to all upcoming exclusive content.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2026/391">Zero-Knowledge IOPPs for Constrained Interleaved Codes</a> | Alessandro Chiesa, Giacomo Fenzi, and Guy Weissenberg</p></li><li><p><a href="https://eprint.iacr.org/2026/179">Nudge: A Private Recommendations Engine</a> | Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs and Dan Boneh</p></li><li><p><a href="https://eprint.iacr.org/2026/175">Implementable Witness Encryption From Arithmetic Affine Determinant Programs</a> | Lev Soukhanov, Yaroslav Rebenko, Muhammad El Gebali and Mikhail Komarov</p></li><li><p><a href="https://eprint.iacr.org/2026/359">Cyclo: Lightweight Lattice-based Folding via Partial Range Checks</a> | Albert Garreta, Helger Lipmaa, Urmas Luha&#228;&#228;r and Micha&#322; Osadnik</p></li><li><p><a href="https://eprint.iacr.org/2026/325">eDAS: Extending Data Availability Sampling With Privacy and Compliance</a> | Isobel Watkins, Nicolas Mohnblatt and Philipp Jovanovic</p></li><li><p><a href="https://eprint.iacr.org/2026/310">Bolt: Faster SNARKs From Sketched Codes</a> | Kobi Gurkan, Andrija Novakovic and Ron D. Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2026/326">Special Soundness and Binding Properties: A Framework for Tightly Secure zk-SNARKs</a> | Erki K&#252;laots, Helger Lipmaa, Roberto Parisella and Janno Siim</p></li><li><p><a href="https://eprint.iacr.org/2026/258">Lightning, Field-Agnostic Super-Efficient Polynomial Commitment Scheme</a> | Wenjie Qu, Yanpei Guo and Jiaheng Zhang</p></li><li><p><a href="https://eprint.iacr.org/2026/266">UltraFold: Efficient Distributed BaseFold From Packed Interleaved Merkle Trees</a> | Wenhao Wang and Fan Zhang</p></li><li><p><a href="https://eprint.iacr.org/2026/251">OpenAC: Open Design for Transparent and Lightweight Anonymous Credentials</a> | Liam Eagen, Hy Ngo, Vikas Rushi, Ying Tong, Moven Tsai and Janabel Xia</p></li><li><p><a href="https://eprint.iacr.org/2026/333">A Cryptographic Framework for Proof of Personhood</a> | Arka Rai Choudhuri, Sanjam Garg, Keewoo Lee, Hart Montgomery, Guru Vamsi Policharla and Rohit Sinha</p></li><li><p><a href="https://eprint.iacr.org/2026/186">Bitcoin PIPEs V2</a> | Michel Abdalla, Brent Carmer, Muhammed El Gebali, Handan Kilinc-Alper, Mikhail Komarov, Yaroslav Rebenko, Lev Soukhanov, Erkan Tairi, Elena Tatuzova and Patrick Towa</p></li><li><p><a href="https://eprint.iacr.org/2026/347">Relaxed Modular PCS From Arbitrary PCS and Applications to SNARKs for Integers</a> | Alireza Shirzad, Sriram Sridhar, Dimitrios Papadopoulos and Charalampos Papamanthou</p></li><li><p><a href="https://eprint.iacr.org/2026/156">Hachi: Efficient Lattice-Based Multilinear Polynomial Commitments over Extension Fields</a> | Ngoc Khanh Nguyen, George O&#8217;Rourke, Jiapeng Zhang</p></li><li><p><a href="https://eprint.iacr.org/2026/242">Neo and SuperNeo: Post-quantum Folding With Pay-per-bit Costs Over Small Fields</a> | Wilson Nguyen and Srinath Setty</p></li><li><p><a href="https://eprint.iacr.org/2026/264">WillowFold: Secure Aggregation With a Lightweight Committee</a> | Hossein Hafezi, Kasra Abbaszadeh, Adri&#224; Gasc&#243;n, Phillipp Schoppmann, Mariana Raykova and Benedikt B&#252;nz</p></li><li><p><a href="https://eprint.iacr.org/2026/289">Zero-Knowledge Proof-Carrying Data From Accumulation Schemes</a> | Tianyu Zheng, Shang Gao and Xun Liu</p></li><li><p><a href="https://eprint.iacr.org/2026/192">Verification Theatre: False Assurance in Formally Verified Cryptographic Libraries</a> | Nadim Kobeissi</p></li><li><p><a href="https://eprint.iacr.org/2026/272">On the Complexity of Interactive Arguments</a> | Idan Baril and Iftach Haitner</p></li><li><p><a href="https://eprint.iacr.org/2026/281">Do Androids Dream of a Dead Internet: Interactive Watermarks for Bot Detection</a> | Brennon Brimhall, Harry Eldridge, Maurice Shih, Ian Miers and Matthew Green</p></li><li><p><a href="https://eprint.iacr.org/2026/200">Plonk Without Random Oracles</a> | Georg Fuchsbauer and Marek Sefranek</p></li><li><p><a href="https://eprint.iacr.org/2026/212">PANCAKE: A SNARK With Plonkish Constraints, Almost-Free Additions, No Permutation Check, and a Linear-Time Prover</a> | Yuxi Xue, Peimin Gao, Xingye Lu and Man Ho Au</p></li><li><p><a href="https://eprint.iacr.org/2026/335">Sumcheck-based zkSNARKs Are Non-Malleable</a> | Antonio Faonio and Luigi Russo</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://ethresear.ch/t/zk-api-usage-credits-llms-and-beyond/24104/1">ZK API Usage Credits: LLMs and Beyond</a> | Davide Crapis and Vitalik Buterin</p></li><li><p><a href="https://ethresear.ch/t/privatex402-privacy-preserving-payment-channels-for-multi-agent-ai-systems/24151">PrivateX402: Privacy-Preserving Payment Channels for Multi-Agent AI Systems</a> | Conor McMenamin and Artem Grigor</p></li><li><p><a href="https://forum.zcashcommunity.com/t/zai-shielded-stability-primitive/54759">ZAI: Shielded Stability Primitive</a> | ColludingNode</p></li><li><p><a href="https://www.conor.computer/blog/ml-dsa-pre-hash-or-pure">ML-DSA: To Pre-Hash or Not to Pre-Hash</a> | Conor Deegan</p></li><li><p><a href="https://x.com/nellycyberpro/status/2026016203886498055">ZK History Refresher</a> | xiamaomao</p></li><li><p><a href="https://x.com/sshankar/status/2026356935029637458">Why ZK Will Win </a>| Shiv Shankar</p></li><li><p><a href="https://x.com/zkDragon/status/2026047830759182672">Quantum Recoverable Zcash</a> | zkDragon</p></li><li><p><a href="https://www.zellic.io/blog/solana-sbpf">Inside the SVM - sBPF JIT Security Pitfalls and Memory Leaks</a> | Zellic</p></li><li><p><a href="https://x.com/secparam/status/2027216141177774320?s=20">On the Large-scale online deanonymization with LLMs paper</a> | Ian Miers</p></li><li><p><a href="https://x.com/succinctlabs/status/2027107601255653599?s=46">AdversIm</a> | Succinct</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://youtu.be/JMTJ0P1_WNY?si=VC-fjXTzBc2p0Kwr">Stateful ZK Identity with Ian Miers</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://www.youtube.com/watch?v=Dad2UonQ9Ag">lean Ethereum Part 1: Introduction with Justin Drake</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://www.youtube.com/watch?v=xh8hbz1nqxQ">lean Ethereum Part 2: PQ Signatures and Poseidon with Dmitry and Benedikt</a>  | Zero Knowledge Podcast</p></li><li><p><a href="https://x.com/arjunkhemani/status/2025841073361461358">Tachyon Whiteboard Session </a>| Arjun Khemani &amp; zkDragon</p></li><li><p><a href="https://x.com/SecurityOak/status/2026258963277492322">Zero-Knowledge Technology with Jordi Baylina</a> | CypherTalk</p></li><li><p><a href="https://www.youtube.com/watch?v=aPPPcuYZWWU">Proving Ethereum in Real-Time With OpenVM</a> | Yi Sun (Axiom) | EthDenver</p></li><li><p><a href="https://medium.com/veridise/inside-sp1-with-tamir-hemo-succincts-approach-to-zk-vm-performance-security-2919ae7dbc0e?source=rss-d54583b14487------2">Inside SP1 With Tamir Hemo: Succinct&#8217;s Approach to ZK-VM Performance &amp; Security</a> | Veridise</p></li><li><p><a href="https://www.youtube.com/watch?v=vSGbtvjMri8">Formalising FRI: A Lean Blueprint of Security</a> | Petar Maksimovic (Nevermind) | EtheDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=9fLuYCOjlb8">Security Blindspots Beyond L2s</a> | Luca Donno (L2BEAT) | EthDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=1PRnm4qomKA">ZisK: A zkVM Foundation for Next-Gen Blockchains</a> | Jordi Baylina (ZisK) | EthDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=gXnDbcdfayI">ZKPs on Bitcoin |</a> Ying Tong, David, Volokh, Keagan | EthDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=zv2LUOEz1Bw">Compliant Cross-Chain Lending With ZK Pre-Checks </a>| Kacper Koziol (Amish Protocol) | EthDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=2XaVCY8hKmk">Keeper: Turning Geth Into a zkVM Guest Program</a> | Guillaume Ballet (EF) | EthDenver</p></li><li><p><a href="https://www.youtube.com/watch?v=a6y4ZAGASgY">Jolt: Making Client-Side ZK into a Commodity </a>| Andrew Tretyakov (a16z crypto) | EthDenver</p></li></ul><h4> Guides and Resources</h4><ul><li><p><a href="https://github.com/Verified-zkEVM/ArkLib">Formally Verified Arguments of Knowledge</a> | Nethermind</p></li><li><p><a href="https://x.com/alinush/status/2027028055714156891?s=46">Chunky: Weighted PVSS and DKG for field elements</a> | Alin Tomescu</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://x.com/dumbnamenumbers/status/2026112985215758547">Ethereum Should Enshrine Private Transfers (+ Demo!)</a> | Tom Lehman</p></li><li><p><a href="https://midnight.city/">Midnight City</a> | Midnight</p></li></ul><h4> Vulnerabilities</h4><ul><li><p><a href="https://arxiv.org/abs/2602.16800">Large-scale online deanonymization with LLMs</a> | Simon Lermen, Daniel Paleka, Joshua Swanson, Michael Aerni, Nicholas Carlini and Florian Tram&#232;r</p></li><li><p><a href="https://eprint.iacr.org/2026/306">Skipping Class: Algebraic Attacks exploiting weak matrices and operation modes of Poseidon2(b)</a> | Simon-Philipp Merz and &#192;lex Rodr&#237;guez Garc&#237;a</p></li><li><p><a href="https://eprint.iacr.org/2026/227">Analysis and Vulnerabilities In Zklogin</a> | Sofia Celi, Hamed Haddadi and Kyle Den Hartog</p></li><li><p><a href="https://x.com/zksecurityXYZ/status/2027417243059896544">The first two known exploits against live ZK circuits</a> | zkSecurity</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://x.com/zERC20io/status/2025753385950126141">zERC20 Privacy Wrapper </a>| zERC20</p></li><li><p><a href="https://x.com/zodl_app/status/2023427477830275147">Zashi Is Becoming Zodl</a> | Zodl</p></li><li><p><a href="https://core.taceo.io/articles/oprf-beta/">TACEO:OPRF Service Is Live In Public Beta</a> | TACEO</p></li><li><p><a href="https://blog.lambdaclass.com/ethlambda-building-a-post-quantum-ethereum-client-with-the-help-of-shared-tooling/">Ethlambda: Building a Post-quantum Ethereum Client With the Help of Shared Tooling</a> | Lambda Class</p></li><li><p><a href="https://blog.succinct.xyz/optimism-superchain/">Optimism Chooses Succinct to Bring ZK to the Superchain</a> | Succinct</p></li><li><p><a href="https://x.com/0xMiden/status/2025948806571798713">Testnet v0.13: Major DevEx &amp; Protocol Improvements </a>| Miden</p></li><li><p><a href="https://forum.zcashcommunity.com/t/shielded-labs-thoughts-on-polling-governance/54773">Shielded Labs: Thoughts on Polling &amp; Governance</a> | Shielded Labs</p></li><li><p><a href="https://pse.dev/blog/pse-february-2026">PSE February 2026 Newsletter</a> | PSE</p></li><li><p><a href="https://www.theblock.co/post/390129/starkware-integrates-ey-built-nightfall-privacy-tech-into-starknet-to-provide-confidential-institutional-transactions-on-public-blockchains?utm_source=twitter&amp;utm_medium=social">StarkWare integrates EY-built Nightfall privacy tech into Starknet</a> | StarkNet</p></li><li><p><a href="https://x.com/ShieldApp/status/2023763407019937823">Shield Launched</a> | Aleo</p></li><li><p><a href="https://pages.ligero-inc.com/ligero-pilots-onchain-payroll-platform-on-espresso">Ligero Pilots Onchain Payroll Platform on Espresso</a> | Ligero</p></li><li><p><a href="https://www.o1labs.org/blog/o1js-native-prover">o1js Goes Native</a> | o1Labs</p></li><li><p><a href="https://x.com/SuccinctLabs/status/2024514396760732076">Hypercube is live on mainnet</a> | Succinct</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9 &#8211; 11</p></li><li><p><a href="https://www.meetup.com/ethereum-dev-nl/events/313023736/">Privacy on Ethereum MeetUp</a> | Amsterdam, Netherlands. February 5</p></li><li><p><strong><a href="https://www.zksummit.com/">zkSummit 14</a> | Rome, Italy. May 7</strong></p></li><li><p><a href="https://zfnd.org/zcash-dev-summits/">Zcash Dev Summit</a> | Rome, Italy. May 8</p></li><li><p><a href="https://ethprague.com/">ETHPrague</a> | Prague, Czech Republic May 8-10</p></li><li><p><a href="https://www.ethdam.com/">ETHDam</a> | Amsterdam, Netherlands. May 9 - 10</p></li><li><p><a href="https://zkproof.org/events/zkproof-8-rome/">Zkproof 8</a> | Rome, Italy. May 9 - 10</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt 2026</a> | Rome, Italy. May 10 - 14</p></li><li><p><a href="https://luma.com/commons3nse">Common S3nse</a> | Amsterdam, Netherlands. Sept 4</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a> | Mumbai, India. Q4 2026 &#8203;&#8203;</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a> or <a href="https://x.com/zeroknowledgefm">@zeroknowledgefm</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">ZK Mesh is a reader-supported publication. To receive new posts and support our work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Addendum: Post Quantum Cryptography]]></title><description><![CDATA[Today, we are releasing our first Addendum for zkMesh+ subscribers.]]></description><link>https://zkmesh.substack.com/p/addendum-post-quantum-cryptography</link><guid isPermaLink="false">https://zkmesh.substack.com/p/addendum-post-quantum-cryptography</guid><dc:creator><![CDATA[Zero Knowledge Podcast]]></dc:creator><pubDate>Wed, 18 Feb 2026 16:30:36 GMT</pubDate><content:encoded><![CDATA[<p>Today, we are releasing our first Addendum for zkMesh+ subscribers. As a reminder, these Addendums are our monthly deep dives into technologies adjacent to ZK. Our aim is to explore the intersection of ZK, PQC, FHE, MPC, TEEs, iO, and more.</p><p>This edition focuses on Post-Quantum Cryptography. We have compiled the most relevant research, articles, and real-world implementations into a concise one-pager.</p><p>Below, you&#8217;ll be able to vote on the next topic we should cover.</p>
      <p>
          <a href="https://zkmesh.substack.com/p/addendum-post-quantum-cryptography">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bonus: Ian Miers on the Evolving Zcash Narrative]]></title><description><![CDATA[Hello! As announced yesterday, we have a special exclusive podcast clip to share with you as a zkMesh+ subscriber.]]></description><link>https://zkmesh.substack.com/p/bonus-ian-miers-on-the-evolving-zcash</link><guid isPermaLink="false">https://zkmesh.substack.com/p/bonus-ian-miers-on-the-evolving-zcash</guid><dc:creator><![CDATA[Zero Knowledge Podcast]]></dc:creator><pubDate>Thu, 12 Feb 2026 14:02:23 GMT</pubDate><content:encoded><![CDATA[<p>Hello!</p><p>As announced yesterday, we have a special exclusive podcast clip to share with you as a zkMesh+ subscriber. This segment is from <a href="https://zeroknowledge.fm/podcast/389/">episode 389</a> of the Zero Knowledge Podcast featuring Ian Miers, Assistant Professor of Computer Science at the University of Maryland.<br><em><strong><br>BONUS CLIP FROM EPISODE 389</strong></em></p>
      <p>
          <a href="https://zkmesh.substack.com/p/bonus-ian-miers-on-the-evolving-zcash">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[zkMesh: January 2026 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zkmesh-january-2026-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zkmesh-january-2026-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Fri, 30 Jan 2026 15:03:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/167f1c1c-29c9-4717-ae9b-bbc1b02c38e0_1282x490.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly curated newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research. Below we share recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events.</p><p>** A quick note: we&#8217;ve just launched <strong><a href="https://zkmesh.substack.com/subscribe">zkMesh+</a></strong>, a paid subscription tier for community members who want deeper technical insight, extra context, and to support us in the making of the ZK Mesh newsletter and the Zero Knowledge Podcast. We recently shared our first two exclusives: the State of ZK Report (Q4 2025) and a bonus podcast clip with Sean Bowe (Zcash) on the quantum threat.  </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">ZK Mesh is a reader-supported publication. Subscribe and join the paid tier to get access to all upcoming exclusive content.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/2340">OOPS: One-time Oblivious Polynomial Signatures</a> | Kobi Gurkan, Philipp Jovanovic and Andrija Novakovic</p></li><li><p><a href="https://eprint.iacr.org/2026/049">Argo MAC: Garbling With Elliptic Curve MACs</a> | Liam Eagen and Ying Tong Lai</p></li><li><p><a href="https://eprint.iacr.org/2026/089">The Billion Dollar Merkle Tree</a> | Thomas Coratger, Dmitry Khovratovich, Bart Mennink, Benedikt Wagner</p></li><li><p><a href="https://eprint.iacr.org/2026/016">Aborting Random Oracles: How to Build Them, How to Use Them</a> | Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro and Benedikt Wagner</p></li><li><p><a href="https://eprint.iacr.org/2026/136">Private Proofs of When and Where</a> | Uma Girish, Grzegorz Gluch, Shafi Goldwasser, Tal Malkin, Leo Orshansky, Henry Yuen</p></li><li><p><a href="https://eprint.iacr.org/2026/091">Round-Optimal Pairing-Free Blind Signatures</a> | Julia Kastner, Stefano Tessaro and Greg Zaverucha</p></li><li><p><a href="https://eprint.iacr.org/2026/065">BABE: Verifying Proofs On Bitcoin Made 1000x Cheaper</a> | Sanjam Garg, Dimitris Kolonelos, Mikhail Sergeevitch, Srivatsan Sridhar and David Tse</p></li><li><p><a href="https://eprint.iacr.org/2026/044">Jindo: Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments</a> | Intak Hwang, Hyeonbum Lee, Jinyeong Seo and Yongsoo Song</p></li><li><p><a href="https://eprint.iacr.org/2026/008">A SNARK for (Non-)Subsequences With Text-Sub-Linear Proving Time</a> | Dario Fiore, San Ling, Khai Hanh Tang, Hong Hanh Tran, Huaxiong Wang and Yingfei Yan</p></li><li><p><a href="https://eprint.iacr.org/2026/063">Policy-based Access Tokens: Privacy-Preserving Verification for Digital Identity</a> | Kiran Pun, Daniel Gardham and Nick Frymann</p></li><li><p><a href="https://eprint.iacr.org/2026/073">zkRNN: Zero-Knowledge Proofs for Recurrent Neural Network Inference</a> | Fatemeh Zarinjouei, Behzad Abdolmaleki, Maryam Zarezadeh, Bhavish Mohee, Aysajan Abidin and Stefan K&#246;psell</p></li><li><p><a href="https://eprint.iacr.org/2026/077">Formalizing Privacy In Decentralized Identity: A Provably Secure Framework With Minimal Disclosure</a> | Yu Zhang and Zongbin Wang</p></li><li><p><a href="https://eprint.iacr.org/2026/076">Lether: Practical Post-Quantum Account-Based Private Blockchain Payments</a> | Hongxiao Wang, Muhammed F. Esgin, Ron Steinfeld and Siu-Ming Yiu</p></li><li><p><a href="https://eprint.iacr.org/2026/081">HYPERSHIELD: Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries Without Masking</a> | Linda Pirker, Quinten Norga, Suparna Kundu, Anindya Ganguly, Barry van Leeuwen, Angshuman Karmakar and Ingrid Verbauwhede</p></li><li><p><a href="https://eprint.iacr.org/2026/144">Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index</a> | Weijie Wang, Charalampos Papamanthou, Shravan Srinivasan, Dimitrios Papadopoulos</p></li><li><p><a href="https://eprint.iacr.org/2026/111">Structured Matrix Constraint Systems for Architecture-Hiding Succinct Zero-Knowledge Proofs for Neural Networks</a> | Mingshu Cong, Sherman S. M. Chow, Tsz Hon Yuen and Siu-Ming Yiu</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://blog.nexus.xyz/permutation-proofs-deja-vu/">Permutation Proofs D&#233;j&#224; Vu</a> | Jens Groth</p></li><li><p><a href="https://blog.lambdaclass.com/a-sharper-look-at-fri/">A sharper look at FRI</a> | LambdaClass</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/simple-rbr-fri/">Lean4 Formalization of &#8220;a Simplified Round-by-round Soundness Proof of FRI&#8221;</a> | zkSecurity</p></li><li><p><a href="http://v">Why Shielded Pools Matter: The Math of Privacy</a> | Sombra</p></li><li><p><a href="https://x.com/VitalikButerin/status/2015599527370293422">ZK-SNARKs Changed My Mind</a> | Vitalik Buterin</p></li><li><p><a href="https://pse.dev/blog/px-user-survey-2025">Measuring the Privacy Experience on Ethereum</a> | PSE</p></li><li><p><a href="https://argument.xyz/blog/riscv-good-bad/">RISC-V ZKVMs: the Good and the Bad</a> | Argument</p></li><li><p><a href="https://www.taurushq.com/blog/tokenization-privacy-solutions-an-institutional-review/">Tokenization Privacy Solutions: An Institutional Review</a> | JP Aumasson</p></li><li><p><a href="https://medium.com/@laurippeltonen/generating-zk-proofs-in-browser-today-7d3fac01c34c?source=rss-5ae943ec1945------2">Generating ZK Proofs In Browser Today</a> | Lauri Peltonen</p></li><li><p><a href="https://zkmesh.substack.com/p/welcome-to-zkmesh">State of ZK Report - Q4 2025</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://x.com/kostascrypto/status/2007703678048973035">SoK: Privacy-Preserving Transactions in Blockchains</a> | Mysten Labs</p></li><li><p><a href="https://x.com/a16zcrypto/status/2008611265565127086">Privacy Trends 2026</a> | a16z</p></li><li><p><a href="https://x.com/mert/status/2013748008329072966">the transparent money problem</a> | mert</p></li><li><p><a href="https://pse.dev/blog/client-side-gpu-everyday-ef-privacy">Client-Side GPU Acceleration for ZK: A Path to Everyday Ethereum Privacy</a> | PSE</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://x.com/Bankless/status/2015771713116795355">Zcash Founder on Privacy, AI, and How ZEC is &#8216;Encrypted Bitcoin&#8217;</a> | Bankless</p></li><li><p><a href="https://zeroknowledge.fm/podcast/388/">Sean Bowe on Tachyon and the Evolution of Zcash</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://zkmesh.substack.com/p/bonus-sean-bowe-on-the-quantum-threat">Bonus Clip with Sean Bowe on the Quantum Threat</a> | zkMesh+ <em>(paid members only)</em></p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://x.com/tcoratger/status/2013321482525417818">Companion book to LeanSpec</a> | Thomas Coratger</p></li><li><p><a href="https://0xparti.github.io/zkBook/">ZK Book</a> | 0xParti</p></li><li><p><a href="https://ziemann.me/leansig/">Lean Ethereum - LeanSig</a> | Ziemann</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://x.com/dev_jodee/status/2008971112517099985">ZK circuits in Noir on Solana</a> | Solana Foundation</p></li><li><p><a href="https://github.com/tanctl/rime">A privacy-hardened Unified Address light client for Zcash</a> | Tanya</p></li></ul><h4> Vulnerabilities</h4><ul><li><p><a href="https://muellerberndt.medium.com/finding-soundness-bugs-in-zk-circuits-ea23387a0e1e">A Practical Guide to Finding Soundness Bugs in ZK Circuits</a> | Bernhard Mueller</p></li><li><p><a href="https://x.com/NethermindSec/status/2014323645452062899">The Unverified Public Key Attack: When Your ZK Proof Proves Nothing</a> | Nethermind</p></li><li><p><a href="https://eprint.iacr.org/2026/101">Analysis and Attacks On the Reputation System of Nym</a> | Xinmu Alexis Cao and Matthew Green</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://x.com/drakefjustin/status/2014791629408784816">The new Post Quantum (PQ) team</a> | Ethereum Foundation</p></li><li><p><a href="https://x.com/openvm_org/status/2016919302767861795">OpenVM 2.0 and the SWIRL proof system</a> | OpenVM</p></li><li><p><a href="https://provably.ai/blogs/Rethinking_Verifiable_Databases">qedb: Rethinking Verifiable Databases from the Ground Up</a> | Provably</p></li><li><p><a href="https://x.com/idealgroup/status/2013273724632351201?s=20">{ &#120414;&#120409;&#120410;&#120406;&#120417; } is launching</a> | { &#120414;&#120409;&#120410;&#120406;&#120417; }</p></li><li><p><a href="https://github.com/eth-act/planning/blob/b8e612f1335032bde704853c85c9c7a0aeb4d8fa/projects.md">zkEVM on L1</a> | Ethereum</p></li><li><p><a href="https://forum.zcashcommunity.com/t/rfc-order-out-of-chaos-a-neutral-verification-layer-for-zcash/54302">Order out of Chaos: A Neutral Verification Layer for Zcash</a> | ZCash</p></li><li><p><a href="https://x.com/bajpaiharsh244/status/2015846921324384555">Zypherpunks Hackathon Results</a> | Zypherpunks</p></li><li><p><a href="https://x.com/zksync/status/2013270694218412413">Airbender just took the #1 spot on EthProofs</a> | ZKSync</p></li><li><p><a href="https://blog.brevis.network/2026/01/06/brevis-provernet-mainnet-and-brev-are-live/">Brevis ProverNet Mainnet and $BREV Are Live</a> | Brevis</p></li><li><p><a href="https://x.com/anoma/status/2013598063768567998">AnomaPay private beta is live on Base</a> | Anoma</p></li><li><p><a href="https://www.blog.citrea.xyz/what-to-expect-from-citrea-mainnet-privacy-payments-and-earn-with-your-bitcoin/">What to Expect From Citrea Mainnet: Privacy, Payments, and Earn With Your Bitcoin</a> | Citrea</p></li><li><p><a href="https://blog.hyli.org/2025-in-review/">2025 In Review at Hyli</a> | Hyli</p></li><li><p><a href="https://x.com/wakeuplabs/status/1938028657924071630">Building a Stylus-compatible UltraHonk verifier for the WASM world</a> | WakeUp Labs</p></li><li><p><a href="https://blog.celestia.org/introducing-celestia-private-blockspace-confidential-onchain-finance/">Celestia Private Blockspace</a> | Celestia</p></li><li><p><a href="https://zfnd.org/zcash-foundation-2025-year-in-review/">Zcash Foundation: 2025 Year in Review</a> | ZCash</p></li><li><p><a href="https://miden.xyz/resource/blog/practical-privacy">Practical Privacy Is Key To Blockchain&#8217;s Next Era</a> | Miden</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p><a href="https://www.meetup.com/ethereum-dev-nl/events/313023736/">Privacy on Ethereum MeetUp</a> | Amsterdam February 5, 2026</p></li><li><p>zkSummit 14 | Europe tbd. May 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14 2026</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a>  | Mumbai, India. Q4 2026 &#8203;&#8203;</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">ZK Mesh is a reader-supported publication. To receive new posts and support our work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Bonus: Sean Bowe on the Quantum Threat]]></title><description><![CDATA[An exclusive podcast clip to share with you as a zkMesh+ subscriber!]]></description><link>https://zkmesh.substack.com/p/bonus-sean-bowe-on-the-quantum-threat</link><guid isPermaLink="false">https://zkmesh.substack.com/p/bonus-sean-bowe-on-the-quantum-threat</guid><dc:creator><![CDATA[Zero Knowledge Podcast]]></dc:creator><pubDate>Thu, 22 Jan 2026 17:48:47 GMT</pubDate><content:encoded><![CDATA[<p>Hello!</p><p>As we announced yesterday, we have a special exclusive podcast clip to share with you as a zkMesh+ subscriber. This is from episode 388 of the Zero Knowledge Podcast with Sean Bowe, Zcash core developer and lead on Tachyon. <br><em><strong><br>BONUS CLIP FROM EPISODE 388</strong></em> </p>
      <p>
          <a href="https://zkmesh.substack.com/p/bonus-sean-bowe-on-the-quantum-threat">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Welcome to zkMesh+]]></title><description><![CDATA[and thanks for subscribing!]]></description><link>https://zkmesh.substack.com/p/welcome-to-zkmesh</link><guid isPermaLink="false">https://zkmesh.substack.com/p/welcome-to-zkmesh</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Wed, 21 Jan 2026 19:30:48 GMT</pubDate><content:encoded><![CDATA[<p>We are excited to be launching this new initiative. Below, you&#8217;ll find a link to the State of ZK Report for Q4 2025, a summary of everything that mattered in ZK last quarter.</p><p>What can you expect next?</p><p>To celebrate the launch of zkMesh+ we will soon be sharing an exclusive bonus clip from our recent podcast episode 388 with Sean Bowe. Sean is a Zcash core &#8230;</p>
      <p>
          <a href="https://zkmesh.substack.com/p/welcome-to-zkmesh">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[ZK Mesh: December 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zk systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-december-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-december-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Tue, 30 Dec 2025 15:16:10 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/37a4f1e8-bd0b-46f7-bd1a-8fed7017e27e_1792x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zk systems research.</p><p>Each month, we bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. ZK Mesh is produced by ZK Hack.</p><p><em><strong>Starting January 2026, we will be introducing a new subscription tier called zkMesh+. Subscribers will gain access to additional content and context. Find out more <a href="https://zkmesh.substack.com/p/introducing-zkmesh-4cb">here</a>! </strong></em></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Already know you want to support? Subscribe and pledge to support us!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/2197">Small-field Hash-based SNARGs Are Less Sound Than Conjectured</a> | Giacomo Fenzi and Antonio Sanso</p></li><li><p><a href="https://eprint.iacr.org/2025/2328">SNARGs for NP from LWE</a> | Eylon Yogev and Ziyi Guan</p></li><li><p><a href="https://eprint.iacr.org/2025/2285">Laminate: Succinct SIMD-Friendly Verifiable FHE</a> | Kabir Peshawaria, Zeyu Liu, Ben Fisch and Eran Tromer</p></li><li><p><a href="https://eprint.iacr.org/2025/2204">Consistency Verification for Zero-Knowledge Virtual Machine On Circuit-Irrelevant Representation</a> | Jingyu Ke, Boxuan Liang and Guoqiang Li</p></li><li><p><a href="https://eprint.iacr.org/2025/2212">Architecture-private Zero-knowledge Proof of Neural Networks</a> | Yanpei Guo, Zhanpeng Guo, Wenjie Qu and Jiaheng Zhang</p></li><li><p><a href="https://eprint.iacr.org/2025/2220">Performance Improvements of ZK-Prover for Rwasm: A Sound and Efficient AIR for 32-bit Division and Remainder</a> | Suleyman Kardas, Mehmet Sabir Kiraz, Dmitry Savonin, Yao Wang and Aliaksei Dziadziuk</p></li><li><p><a href="https://eprint.iacr.org/2025/2228">PIRANHAS: PrIvacy-Preserving Remote Attestation In Non-Hierarchical Asynchronous Swarms</a> | Jonas Hofmann, Philipp-Florens Lehwalder, Shahriar Ebrahimi, Parisa Hassanizadeh and Sebastian Faust</p></li><li><p><a href="https://eprint.iacr.org/2025/2234">ZeroOS: A Universal Modular Library OS for zkVMs</a> | Guangxian Zou, Isaac Zhang, Ryan Zarick, Kelvin Wong, Thomas Kim, Daniel L.-K. Wong, Saeid Yazdinejad and Dan Boneh</p></li><li><p><a href="https://eprint.iacr.org/2025/2239">Rejection-Free Framework of Zero-Knowledge Proof Based On Hint-MLWE</a> | Antoine Douteau and Adeline Roux-Langlois</p></li><li><p><a href="https://eprint.iacr.org/2025/2238">arya-STARK: Aggregation-Robust yet Authentic Training Via STARK Proofs</a> | Abdoul Ahad FALL</p></li><li><p><a href="https://eprint.iacr.org/2025/2253">Efficient Privacy-Preserving Blueprints for Threshold Comparison</a> | Pratyush Ranjan Tiwari, Harry Eldridge and Matthew Green</p></li><li><p><a href="https://eprint.iacr.org/2025/2263">Completing Policy-based Anonymous Tokens: Private Bits, Public Metadata and More...</a> | David Kretzler, Yong Li and Codrin Ogreanu</p></li><li><p><a href="https://eprint.iacr.org/2025/2280">Security Models and Cryptographic Protocols In a Quantum World</a> | C&#233;line Chevalier, Paul Hermouet and Quoc-Huy Vu</p></li><li><p><a href="https://eprint.iacr.org/2025/2292">FRIVail: A Data Availability Scheme Based On FRI Binius</a> | Rachit Anand Srivastava</p></li><li><p><a href="https://eprint.iacr.org/2025/2286">Improving the Efficiency of zkSNARKs for Ballot Validity</a> | Felix R&#246;hr, Nicolas Huber and Ralf K&#252;sters</p></li><li><p><a href="https://eprint.iacr.org/2025/2296">SoK: Verifiable Federated Learning</a> | Francesco Bruschi, Marco Esposito, Tommaso Gagliardoni and Andrea Rizzini</p></li><li><p><a href="https://eprint.iacr.org/2025/2301">High-Performance SIMD Software for Spielman Codes In Zero-Knowledge Proofs</a> | Florian Krieger, Christian Dobrouschek, Florian Hirner and Sujoy Sinha Roy</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://app.math.inc/zk-linalg">Certifying The Fri Protocol</a> | Math Inc</p></li><li><p><a href="http://x.com/drakefjustin/status/1950979137650520514">Lean Ethereum</a> | Justin Drake</p></li><li><p><a href="https://ethresear.ch/t/post-quantum-signature-aggregation-a-folding-approach/23639/1">Post Quantum Signature Aggregation: a Folding Approach</a> | Thomas Coratger, Srinath Setty</p></li><li><p><a href="https://ethresear.ch/t/zk-secret-santa-protocol/23582">ZK Secret Santa</a> | Arvolear</p></li><li><p><a href="https://pse.dev/articles/state-of-private-voting-2026/state-of-private-voting-2026-v2.pdf">State of Private Voting 2026</a> | PSE &amp; MACI</p></li><li><p><a href="https://zkevm.ethereum.foundation/blog/repricings-for-block-proving-part-1">Repricings for block proving (Part 1: The motivation)</a> | Ignacio Hagopian</p></li><li><p><a href="https://x.com/Zac_Aztec/status/1996279654446162398">The Blockchain Canon</a> | Zachary Williamson</p></li><li><p><a href="https://a16zcrypto.com/posts/article/secure-efficient-zkvms-progress/">The path to secure and efficient zkVMs: How to track progress</a> | Justin Thaler</p></li><li><p><a href="https://x.com/BagadSuyash/status/1995648873252225058">Private account abstraction is already close to being a reality</a> | Suyash Bagad</p></li><li><p><a href="https://x.com/a16zcrypto/status/2000620915676393599">17 things we&#8217;re excited about for crypto in 2026</a> | a16z</p></li><li><p><a href="https://x.com/odin_free/status/1987792282838335787">4 years in ZK. No PhD needed. Here&#8217;s what you actually need to know</a> | Brother Odin</p></li><li><p><a href="https://x.com/jillgun/status/2001040089909207533">Privacy as a means of Consumer Protection</a> | Jill Gunter</p></li><li><p><a href="https://reilabs.io/blog/scaling-sparse-merkle-trees-to-billions-of-keys-with-largesmt/">Scaling Sparse Merkle Trees to Billions of Keys with LargeSMT</a> | Reilabs</p></li><li><p><a href="https://x.com/rstormsf/status/2001162811775574476">Roman Storm Case Update</a> | Roman Storm</p></li><li><p><a href="https://cnode.phd/demystifying_formal_zksnark_jargon/">Demystifying formal zksnark jargon</a> | colluding ode</p></li><li><p><a href="https://www.theblock.co/post/383680/aztec-zcash-year-pragmatic-privacy-root?utm_source=twitter&amp;utm_medium=social">From Aztec to Zcash: The year &#8216;pragmatic privacy&#8217; took root</a> | The Block</p></li><li><p><a href="https://x.com/NethermindSec/status/2005250384017707354">Formal Verification of zk circuits</a> | Nethermind</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://x.com/CommonPrefix/status/1999514585775128759">Can Data Availability be Zero Knowledge?</a> | Common Prefix</p></li><li><p><a href="https://x.com/TheBlockPods/status/1993456847383413100">Lighter CEO on &#8216;Democratizing Finance&#8217; with a zero-fee, ZK perp DEX</a> | The Block</p></li><li><p><a href="https://x.com/paulbrigner/status/2000657297429672204">Zooko Wilcox at the SEC</a> | Paul Brigner</p></li><li><p><a href="https://youtu.be/vqBef6XFB4A?si=kUO0CT2lBGra1o_k">ZK Whiteboard Sessions - S3M7: zkID (Anonymous Credentials), w/ Ying Tong</a> | ZK Hack</p></li><li><p><a href="https://youtu.be/fp-inljHYGA?si=V0ciCHFfATxrqiYe">ZK Whiteboard Sessions - S3M8: ZKML, w/ Jason Morton</a> | ZK Hack</p></li><li><p><a href="https://www.youtube.com/watch?v=2OtbOeFDd6g">zkStudyClub: Reed Solomon Proximity Gaps &amp; Disproving Existing Conjectures</a> | ZK Podcast</p></li><li><p><a href="https://youtu.be/wpNpAhfKmhY?si=Vod52oKcXJvOP92a">Year in Review: ZK Podcast in 2025 &amp; Beyond</a> | ZK Podcast</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://rareskills.io/cairo-tutorial">Mastering Cairo</a> | Rareskills</p></li><li><p><a href="https://floatingpragma.io/starklab/">STARK Lab</a> | Bernhard Mueller</p></li><li><p><a href="https://floatingpragma.io/awesome-zk-proofs/">Awesome ZKPs</a> | Bernhard Mueller</p></li><li><p><a href="https://x.com/blkylimm/status/2001228007730520350">Miden Playground Tutorial</a> | blkylimm</p></li><li><p><a href="https://rareskills.io/cairo-tutorial">Cairo Tutorial</a> | RareSkills</p></li><li><p><a href="https://alinush.github.io/gkr">Goldwasser-Kalai-Rothblum (GKR) proofs</a> | Alin Tomescu</p></li><li><p><a href="https://noir-lang.org/docs/tutorials/noirjs_app">Building a web app with Noir and Barretenberg</a> | Noir</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/Plonky3/Plonky3/pull/1196">mersenne 31: optimize Poseidon2 for aarch64 Neon</a> | tcoratger</p></li><li><p><a href="https://github.com/mohammed7s/zec-p2p">Sell $ZEC for fiat P2P without trusting the counterparty</a> | mohammed7s</p></li><li><p><a href="https://forum.zcashcommunity.com/t/proposal-trustless-bridging-for-zcash/53884">Trustless bridging for Zcash (ZK Sync &lt;&gt; Zcash)</a> | ZKSync</p></li></ul><h4> Project Updates</h4><ul><li><p><a href="https://ethproofs.org/blog/ethproofs-2025-review-2026-roadmap">Ethproofs 2025 Review &amp; 2026 Roadmap</a> | EthProofs</p></li><li><p><a href="https://pse.dev/blog/privacy-experience-report">Why Users Don&#8217;t Use Privacy (Yet): Insights from On-Chain Privacy Experience</a> | PSE</p></li><li><p><a href="https://merces-demo.taceo.io/arc/introduction/overview">Merces by TACEO</a> | TACEO</p></li><li><p><a href="https://electriccoin.co/blog/reorganizing-around-zcash-user/">Reorganizing Around Zcash User</a> | ZCash | Electric Coin Company</p></li><li><p><a href="https://x.com/0xMiden/status/2000924638151582115">A new Miden Playground</a> | Miden</p></li><li><p><a href="https://x.com/jswihart/status/2002932548838506693">The Launch Window. Zcash Update</a> | Josh Swihart</p></li><li><p><a href="https://blog.hyli.org/hyliquid/">A Fast, Non-custodial Private Exchange: Introducing Hyliquid</a> | Hyli</p></li><li><p><a href="https://electriccoin.co/blog/zashi-2-4-9-is-faster/">Zashi 2.4.9 Is Faster!</a> | Electric Coin Company</p></li><li><p><a href="https://blog.brevis.network/2025/12/08/brevis-provernet-mainnet-beta-is-live/">Brevis ProverNet Mainnet Beta Is Live</a> | Brevis</p></li><li><p><a href="https://x.com/web3privacy/status/2000590048115212645">Ethereum Privacy Hackathons by the Numbers</a> | Web3PrivacyNow</p></li><li><p><a href="https://medium.com/veridise/ethereums-zkevm-formal-verification-project-securing-the-ethereum-l1-transition-to-zkvms-with-0abcd346651e?source=rss-d54583b14487------2">Ethereum&#8217;s zkEVM Formal Verification Project</a> | Veridise</p></li><li><p><a href="https://x.com/0xprivacypools/status/2001047640042054119">Live in Arbitrum</a> | Privacy Pools</p></li><li><p><a href="https://x.com/taikoxyz/status/1996781641336082606">Taiko ZK proving all blocks</a> | Taiko</p></li><li><p><a href="https://www.zksync.io/blog/zksync-managed-services-raas">ZKsync Managed Services from Matter Labs</a>&#8203;&#8203;&#8203;&#8203;&#8204;&#65279;&#8205;&#65279;&#8203;&#8205;&#8203;&#8205;&#8204;&#8205;&#65279;&#65279;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#8204;&#65279;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#8205;&#8203;&#8205;&#8203;&#8205;&#8203;&#65279;&#8205;&#8205;&#8203;&#8205;&#8203;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8205;&#8204;&#8203;&#8205;&#65279;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#65279;&#8203;&#8205;&#8203;&#8205;&#8203;&#8205;&#65279;&#8203;&#8203;&#8205;&#8203;&#8205;&#8204;&#8205;&#8205;&#8203;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#8204;&#8205;&#8203;&#8205;&#8203;&#8205;&#8203;&#65279;&#8205;&#8205;&#8203;&#8205;&#8203;&#8205;&#8204;&#65279;&#8205;&#8205;&#8204;&#8205;&#8205;&#65279;&#8204;&#65279;&#8203;&#65279;&#8204;&#65279;&#8205;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#8205;&#8203;&#65279;&#8203;&#8205;&#65279;&#8204;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#65279;&#8203;&#8205;&#8204;&#65279;&#8203;&#8203;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8204;&#8203;&#8205;&#65279;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8205;&#8204;&#8203;&#8205;&#65279;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8204;&#8204;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#65279;&#8203;&#8205;&#65279;&#65279;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#65279;&#8204;&#8203;&#8203;&#8205;&#65279;&#65279;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8203;&#8205;&#65279;&#65279;&#8204;&#8205;&#65279;&#8204;&#8204;&#8205;&#65279;&#65279;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8204;&#8204;&#8203;&#65279;&#65279;&#8204;&#8204;&#65279;&#8203;&#8203;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8204;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8203;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#65279;&#8204;&#8205;&#65279;&#8205;&#8203;&#65279;&#8205;&#65279;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#65279;&#8204;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8205;&#8204;&#8203;&#65279;&#8203;&#8204;&#8203;&#65279;&#8204;&#8205;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8203;&#8204;&#8204;&#8205;&#8203;&#8204;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8204;&#8204;&#8203;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8204;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8204;&#8203;&#8203;&#65279;&#8203;&#8203;&#8203;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8205;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8205;&#8204;&#8204;&#8205;&#8204;&#8205;&#8203;&#65279;&#8205;&#8204;&#8204;&#8205;&#8204;&#8205;&#8203;&#8205;&#65279;&#8204;&#8204;&#8205;&#8204;&#8205;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8203;&#65279;&#8203;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8204;&#8205;&#8203;&#65279;&#8204;&#8203;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8204;&#8205;&#8203;&#65279;&#8203;&#8203;&#8203;&#65279;&#8205;&#65279;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8205;&#8204;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8204;&#8204;&#8203;&#65279;&#65279;&#8204;&#8204;&#8205;&#8203;&#8205;&#8204;&#8205;&#65279;&#8203;&#8204;&#8205;&#65279;&#65279;&#8204;&#8205;&#8204;&#65279;&#8203;&#65279;&#8205;&#65279;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8203;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8203;&#8203;&#65279;&#65279;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#65279;&#8203;&#8204;&#8205;&#8204;&#8204;&#8203;&#65279;&#65279;&#65279;&#8204;&#8205;&#8203;&#8205;&#8204;&#8205;&#8203;&#8204;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8204;&#8204;&#8204;&#8204;&#8204;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#65279;&#8203;&#8203;&#65279;&#65279;&#8204;&#8204;&#65279;&#8205;&#8205;&#8204;&#8205;&#8205;&#65279;&#8204;&#65279;&#8203;&#65279;&#8204;&#65279;&#8205;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#8205;&#8203;&#65279;&#8203;&#8205;&#65279;&#8204;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#65279;&#8203;&#8205;&#8204;&#65279;&#8203;&#8203;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8204;&#8203;&#8205;&#65279;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#65279;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8205;&#8204;&#8203;&#8205;&#65279;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8204;&#8204;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#65279;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8205;&#8205;&#8204;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#65279;&#8204;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8205;&#8204;&#8203;&#65279;&#8203;&#8204;&#8203;&#65279;&#8204;&#8205;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8203;&#8204;&#8204;&#8205;&#8203;&#8204;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8205;&#8203;&#8203;&#65279;&#8204;&#8204;&#8203;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8204;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8204;&#8203;&#8203;&#65279;&#8203;&#8203;&#8203;&#65279;&#8203;&#65279;&#8204;&#8205;&#8204;&#8205;&#8203;&#8205;&#65279;&#8204;&#8203;&#65279;&#8205;&#8204;&#8204;&#8205;&#8204;&#8205;&#8203;&#65279;&#8205;&#8204;&#8204;&#8205;&#8204;&#8205;&#8203;&#8205;&#65279;&#8204;&#8204;&#8205;&#8204;&#8205;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8203;&#65279;&#8203;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#8203;&#8203;&#65279;&#8204;&#8205;&#8203;&#65279;&#8204;&#8203;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#8203;&#8204;&#8204;&#8205;&#8204;&#8203;&#8204;&#8205;&#8204;&#8205;&#8203;&#65279;&#8203;&#8203;&#8203;&#8205;&#8204;&#8205;&#8204;&#65279;&#8204;&#8203;&#8204;&#65279;&#8205;&#8204;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8204;&#8204;&#8203;&#65279;&#65279;&#8204;&#8204;&#8205;&#8203;&#8205;&#8204;&#8205;&#65279;&#8203;&#8204;&#8205;&#65279;&#65279;&#8204;&#8205;&#8204;&#65279;&#8203;&#8205;&#8204;&#8205;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8203;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8203;&#8203;&#65279;&#65279;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#65279;&#8203;&#8204;&#8205;&#8204;&#8204;&#8203;&#8205;&#8204;&#8205;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#65279;&#8203;&#8205;&#8204;&#65279;&#8203;&#65279;&#8204;&#65279;&#8203;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#8203;&#65279;&#8204;&#65279;&#8204;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8204;&#8205;&#8204;&#8205;&#8204;&#8204;&#8203;&#65279;&#65279;&#8204;&#8204;&#65279;&#8203;&#8203;&#8204;&#65279;&#8204;&#8204;&#8204;&#8205;&#8203;&#8205;&#8204;&#8205;&#65279;&#8203;&#8204;&#8205;&#8205;&#8204;&#8204;&#65279;&#8203;&#65279;&#8204;&#8205;&#8205;&#8203;&#8204;&#8205;&#8204;&#8204;&#8204;&#8205;&#8204;&#8203;&#8203;&#8205;&#8203;&#8205;&#8204;&#65279;&#65279;&#8204; | ZKsync</p></li><li><p><a href="https://world.org/blog/announcements/the-new-world-app-secure-chat-global-payments-and-mini-apps-for-everyone">World App</a> | World</p></li><li><p><a href="https://x.com/Starknet/status/2001668879357977014">NEAR intents on Starknet</a> | NEAR</p></li><li><p><a href="https://x.com/EliBenSasson/status/2003086048180445419">Starknet Metrics</a> | Starknet</p></li><li><p><a href="https://x.com/ziskvm/status/2002098092930216432">ZisK v0.15.0</a> | ZisK</p></li><li><p><a href="https://github.com/aptos-foundation/AIPs/blob/main/aips%2Faip-137.md">Post-quantum Aptos accounts via SLH-DSA-SHA2-128s signatures</a> | Alin Ush</p></li><li><p><a href="https://x.com/SuccinctLabs/status/2005691002686672996">Succinct in 2025: Delivering Our Promise to Scale Ethereum</a> | Succinct</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p>zkSummit 14 | Europe tbd. May 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14 2026</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a>  | Mumbai, India. Q4 2026 &#8203;&#8203;</p></li></ul><p>There you have it! Hope you liked this edition of ZK Mesh. </p><p>Remember, starting on January, we will be launching zkMesh+ with supplementary content for those seeking deeper technical insight and broader context. </p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Introducing zkMesh+]]></title><description><![CDATA[We wanted to let you know about a new subscription tier we&#8217;re building in the new year called zkMesh+]]></description><link>https://zkmesh.substack.com/p/introducing-zkmesh-4cb</link><guid isPermaLink="false">https://zkmesh.substack.com/p/introducing-zkmesh-4cb</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Thu, 18 Dec 2025 16:15:19 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/84285a5a-f79b-4a3e-972c-55a369c02d3c_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey there, </p><p>As a subscriber to <strong>ZK Mesh</strong>, you&#8217;ll be familiar with our goal of curating useful coverage of the latest work in ZK research, engineering, and the broader community. We wanted to let you know about a new subscription tier we&#8217;re building in the new year called <strong>zkMesh+</strong></p><p>This newsletter isn&#8217;t changing &#8212; the <strong>ZK Mesh Monthly newsletter will remain a free resource</strong>. But for those who want to support the work and access some additional material, zkMesh+ is an optional way to do that. </p><p>Launching in <strong>January 2026</strong>, zkMesh+ will bring together work from the Zero Knowledge Podcast, ZK Hack, and ZK Mesh. Subscribers will have access to a set of additional resources, including:</p><ul><li><p>the quarterly <strong>State of ZK Report</strong></p></li><li><p>monthly addendums on adjacent technologies such as FHE, iO, and MPC</p></li><li><p>early access and discounts for events like <strong>zkSummit </strong>and<strong> ZK Hack hackathons</strong></p></li><li><p>select <strong>subscriber-only Zero Knowledge Podcast segments</strong> and other experimental content</p></li></ul><p>If that sounds interesting, you can <strong><a href="https://zkmesh.substack.com/subscribe">pledge your support ahead of launch</a></strong> directly on the ZK Mesh Substack. We&#8217;ll share more details as we get closer to January. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Thanks, as always, for reading and for being part of the zkMesh community.</p><p>Wishing you a great end to the year,</p><p>ZK Hack / ZK Podcast team</p>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: November 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-november-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-november-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Sun, 30 Nov 2025 17:01:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/df1e8b12-dcd4-400f-a6d5-54c1bbb7c739_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zk systems research.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh. If you like what we do, please subscribe and support!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Each month, we bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><h4>Research</h4><ul><li><p><a href="https://github.com/privacy-ethereum/zkID/blob/main/paper/zkID.pdf">OpenAC: Open Design for Transparent and Lightweight Anonymous Credentials</a> | ZkID Team PSE </p></li><li><p><a href="https://eprint.iacr.org/2025/2055">On Proximity Gaps for Reed&#8211;Solomon Codes</a> | Eli Ben-Sasson, Dan Carmon, Ulrich Hab&#246;ck, Swastik Kopparty and Shubhangi Saraf</p></li><li><p><a href="https://eprint.iacr.org/2025/2046">On Reed&#8211;Solomon Proximity Gaps Conjectures</a> | Elizabeth Crites and Alistair Stewart</p></li><li><p><a href="https://eprint.iacr.org/2025/2054">Optimal Proximity Gaps for Subspace-Design Codes and (Random) Reed-Solomon Codes</a> | Rohan Goyal and Venkatesan Guruswami</p></li><li><p><a href="https://eprint.iacr.org/2025/2051">All Polynomial Generators Preserve Distance With Mutual Correlated Agreement</a> | Sarah Bordage, Alessandro Chiesa, Ziyi Guan and Ignacio Manzur</p></li><li><p><a href="https://eprint.iacr.org/2025/2124">SALSAA &#8211; Sumcheck-Aided Lattice-based Succinct Arguments and Applications</a> | Shuto Kuriyama, Russell W. F. Lai, Micha&#322; Osadnik and Lorenzo Tucci</p></li><li><p><a href="https://eprint.iacr.org/2025/2152">Sum-check protocol for approximate computations</a> | Dor Bitan, Zachary DeStefano, Shafi Goldwasser, Yuval Ishai, Yael Tauman Kalai, and Justin Thaler</p></li><li><p><a href="https://eprint.iacr.org/2025/2031">A Note On Notes: Towards Scalable Anonymous Payments Via Evolving Nullifiers and Oblivious Synchronization</a> | Sean Bowe and Ian Miers</p></li><li><p><a href="https://eprint.iacr.org/2025/2065">TensorSwitch: Nearly Optimal Polynomial Commitments From Tensor Codes</a> | Benedikt B&#252;nz, Giacomo Fenzi, Ron D. Rothblum and William Wang</p></li><li><p><a href="https://eprint.iacr.org/2025/2099">A Lattice-based Designated Verifier zkSNARK From Standard Assumptions</a> | Mohammad Sadegh Ahmadi, Taraneh Eghlidos, Behzad Abdolmaleki and Ngoc Khanh Nguyen</p></li><li><p><a href="https://eprint.iacr.org/2025/2094">Vega: Low-Latency Zero-Knowledge Proofs Over Existing Credentials</a> | Darya Kaviani and Srinath Setty</p></li><li><p><a href="https://eprint.iacr.org/2025/2113.pdf">Single-Server Private Outsourcing of zk-SNARKs</a> | Kasra Abbaszadeh, Hossein Hafezi, Jonathan Katz and Sarah Meiklejohn</p></li><li><p><a href="https://eprint.iacr.org/2025/2030">Succinct Zero-knowledge Proofs From One-way Functions: The Blackbox Way</a> | Eden Florentz- Konopnicki and Ron D. Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2025/2120">Language-Agnostic Detection of Computation-Constraint Inconsistencies in ZKP Programs via Value Inference</a> | Arman Kolozyan, Bram Vandenbogaerde, Janwillem Swalens, Lode Hoste, Stefanos Chaliasos and Coen De Roover</p></li><li><p><a href="https://eprint.iacr.org/2025/2160">Pairing-Based SNARGs with Two Group Elements</a> | Gal Arnon, Jesko Dujmovic and Eylon Yogev</p></li><li><p><a href="https://eprint.iacr.org/2025/2139">Scalable Private World Computer via Root iO: Application-Agnostic iO and Our Roadmap for Making It Practical</a> | Sora Suegami and Enrico Bottazzi</p></li><li><p><a href="https://eprint.iacr.org/2025/2098">Optical Computing of Zero-knowledge Proof With Single-pixel Imaging</a> | Wei Huang, Shuming Jiao, Huichang Guan, Huisi Miao and Chao Wang</p></li></ul><h4>Articles/Threads </h4><ul><li><p><a href="https://blog.zksecurity.xyz/posts/proximity-conjecture/">Proximity Gaps: What Happened and How Does It Affect Our Snarks</a> | zkSecurity</p></li><li><p><a href="https://x.com/bkase_/status/1990922216335159442">Probabilistic implication in SPLAT</a> | Brandon Kase</p></li><li><p><a href="https://commonware.xyz/blogs/zoda">Fast Block Dissemination with Immediate Guarantees</a> | Lucas Meier</p></li><li><p><a href="https://x.com/PrivacyEthereum/status/1991527118627295357">State of Privacy in Ethereum Survey</a> | PSE</p></li><li><p><a href="https://forum.zcashcommunity.com/t/proposal-ztarknet-a-starknet-l2-for-zcash/52926">Ztarknet &#8212; A Starknet L2 for Zcash</a> | abdel</p></li><li><p><a href="https://x.com/drakefjustin/status/1987865569362632936">lowercase SNARKs</a> | Justin Drake</p></li></ul><h4>Videos/Podcasts </h4><ul><li><p><a href="https://youtu.be/9zw5jOMB9UY?si=dHqLJWLPsWmZuSvF&amp;t=2436">Ethproofs call #6, Proximity Gaps</a> | EthProofs</p></li><li><p>ZK Whiteboard Sessions Mod 7: <a href="https://youtu.be/vqBef6XFB4A?si=AkClVKGYUHvLTEKW">zkID (Anonymous Credentials), w/ Ying Tong</a>  <a href="https://x.com/NoirLang/status/1991553820770586944">NoirCon 3</a> | Aztec Network</p></li><li><p><a href="https://www.youtube.com/live/2z0I6ONlKlU?si=sC2Zzd0VRALpwSvi&amp;t=3155">Ethereum Privacy Stack, Buenos Aires Part 1</a> | Web3PrivacyNow</p></li><li><p><a href="https://www.youtube.com/live/76rjTtRdQhM?si=wQIQJCcxLpbcw6e7">Ethereum Privacy Stack, Buenos Aires Part 2</a> | Web3PrivacyNow</p></li><li><p><a href="https://youtu.be/GQML0c1_4Gs?si=zKyKlKNsRv-w1abm">Privacy is Existential (Featuring Peter Van Valkenburgh)</a> | Devconnect</p></li><li><p><a href="https://www.youtube.com/live/IbXLIcCK-6Y?si=dbMb59qyjK9c-Dse">EthProofs Day</a> | Devconnect</p></li><li><p><a href="https://www.youtube.com/watch?v=Z8STZQW6AgY">Zooko &amp; Eli on Zcash, ZK, Privacy, and Scaling</a> | Starkware </p></li><li><p><a href="https://youtu.be/slGUQ77sLwY?si=a9YbhY2P8khnjZH7">Lattices, Folding, &amp; Symphony with Binyi Chen</a> | ZK Podcast</p></li><li><p><a href="https://youtu.be/BZPrr7KMlds?si=NKEm6QDAVx01hZZ_">Pratyush Mishra on Tiny Proofs, Folding, Low-Memory SNARKs and More</a> | ZK Podcast</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://eprint.iacr.org/2025/2110">A Note On Mutual Correlated Agreement for Reed-Solomon Codes</a> | Ulrich Hab&#246;ck</p></li><li><p><a href="https://eprint.iacr.org/2025/2041">Sum-check Is All You Need: An Opinionated Survey On Fast Provers In SNARK Design</a> | Justin Thaler</p></li><li><p><a href="https://x.com/0xAlexKorn/status/1991513804555849754">How Aztec Works</a> | Alex Korn</p></li><li><p><a href="https://alinush.github.io/pedersen">Pedersen commitments</a> | Alin Tomescu</p></li><li><p><a href="https://alinush.github.io/sigmaphore">&#931;-phore</a> | Alin Tomescu</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/bulletproofs-range-proofs/">Stay in Range: Deeper Into Bulletproofs</a> | ZK/SEC Quarterly </p></li><li><p><a href="https://blog.zksecurity.xyz/posts/sumcheck-tutorial/">Learn Sumcheck, MLE, and HyperPlonk: An Interactive Tutorial with SageMath</a> | ZK/SEC Quarterly</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://ethresear.ch/t/smart-contract-or-eoa-spend-authority-for-private-accounts/23422/1">Smart-Contract or EOA Spend Authority for Private Accounts</a> | Adam Gagol</p></li><li><p><a href="https://ethresear.ch/t/implementing-privacy-pools-on-ebsi-for-institutional-programmable-privacy-compliance/23442">Implementing Privacy Pools on EBSI for Institutional Programmable Privacy &amp; Compliance</a> | EugeRe</p></li><li><p><a href="https://www.nethermind.io/blog/formally-verifying-zero-knowledge-circuits-introducing-certiplonk">Formally Verifying Zero-Knowledge Circuits: Introducing CertiPlonk</a> | Nethermind</p></li><li><p><a href="https://github.com/cartridge-gg/dcap-cairo">A Cairo implementation DCAP that supports proving and onchain verification of TEE attestations </a>| Cartridge </p></li><li><p><a href="https://github.com/dyne/longfellow-zk">Longfellow ZK</a> | Dyne</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://eprint.iacr.org/2025/2010">On the Distribution of the Distances of Random Words</a> | Benjamin E. Diamond, Angus Gruen</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://x.com/aztecnetwork/status/1991214517594759652">Aztec Ignition Chain is live</a> | Aztec</p></li><li><p><a href="https://docs.starknet.io/learn/S-two-book/introduction">S-Two Book</a> | Starkware</p></li><li><p><a href="https://x.com/jimpo_potamus/status/1988589670218047974">Irreducible is shutting down</a> | Irreducible</p></li><li><p><a href="https://blog.brevis.network/2025/11/03/proving-grounds-field-operations-now-live/">Proving Grounds Field Operations Now Live</a> | Brevis</p></li><li><p><a href="https://www.blog.citrea.xyz/stress-testing-the-citrea-ecosystem/">&#8383;apps Campaign: Stress Testing the Citrea Ecosystem On the Road to Mainnet</a> | Citrea</p></li><li><p><a href="https://x.com/ziskvm/status/1991331047078867256">ZisK 0.14</a> | ZisK</p></li><li><p><a href="https://core.taceo.io/articles/pss-taceo-services/">Foundations of Private Shared State: The First Services</a> | TACEO</p></li><li><p><a href="https://x.com/SuccinctLabs/status/1990764341264855356">SP1 Hypercube proves 99.7% of Ethereum blocks in real time</a> | Succinct</p></li><li><p><a href="https://forum.zcashcommunity.com/t/shielded-swaps-in-zashi/53204/1">Shielded Swaps in Zashi</a> | ZCash</p></li><li><p><a href="https://x.com/vanishree_rao/status/1987209503331496085">Offchain Dependence = Almost Guaranteed Loss of Money</a> | Fermah</p></li><li><p><a href="https://x.com/0xMiden/status/1993682914882527327">Miden Testnet v0.12 &#8211; What&#8217;s New for Builders</a> | Miden</p></li><li><p><a href="https://www.lagrange.dev/blog/lockheed-martin-supplier-ecosystem">Lagrange Labs Joins Lockheed Martin&#8217;s Supplier Ecosystem to Advance AI for Aerospace and Defense</a> | Lagrange Labs</p></li></ul><h4>Workshop/Education/Internships </h4><ul><li><p><a href="https://youtu.be/qMoHtEWeaGk?si=ulINIXMVlbCvCfD6">Self Workshop</a> | Self</p></li><li><p><a href="https://youtu.be/2SavGITx6dw?si=WexuT6JddOKywwPq">Getting Started with Privacy App Development on Aztec</a> | Aztec</p></li><li><p><a href="https://youtu.be/pI64imxow0A?si=mf5tKH4fHYb-DRVu">Building on Zircuit A Hackathon Introduction</a> | Zircuit </p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://tcc.iacr.org/2025/">Theory of Cryptography Conference (TCC 2025)</a> Aarhus, Denmark. Dec 1-5 </p></li><li><p><a href="https://asiacrypt.iacr.org/2025/">Asiacrypt</a> | Melbourne, Australia. Dec 8-12 </p></li><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p>zkSummit 14 | Europe tbd. May, 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14, 2026</p></li><li><p><a href="https://devcon.org/en/">Devcon India</a>  | Mumbai, India. Q4, 2026 &#8203;&#8203;</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh. If you like what we do, please subscribe and support! </p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: October 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-october-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-october-2025-recap</guid><dc:creator><![CDATA[Hector]]></dc:creator><pubDate>Fri, 31 Oct 2025 15:33:03 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9dff49c9-3e1e-4b31-9a4d-9e41c3b65a87_1388x1234.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>Each month, we bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1905">Symphony: Scalable SNARKs In the Random Oracle Model From Lattice-Based High-Arity Folding</a> | Binyi Chen</p></li><li><p><a href="https://eprint.iacr.org/2025/1938">Zk-cookies: Continuous Anonymous Authentication for the Web</a> | Alexander Frolov, Hal Triedman and Ian Miers</p></li><li><p><a href="https://eprint.iacr.org/2025/1850">Linear*-Time Permutation Check</a> | Benedikt B&#252;nz, Jessica Chen and Zachary DeStefano</p></li><li><p><a href="https://eprint.iacr.org/2025/1839">Lattice-Based zk-SNARKs With Hybrid Verification Technique</a> | Supriya Adhikary, Puja Mondal and Angshuman Karmakar</p></li><li><p><a href="https://eprint.iacr.org/2025/1793">A Note On the Soundness of an Optimized gemini Variant</a> | Ariel Gabizon and Nishat Koti</p></li><li><p><a href="https://eprint.iacr.org/2025/1781">High-Throughput Universally Composable Threshold FHE Decryption</a></p></li><li><p><a href="https://eprint.iacr.org/2025/1967">Linear-time and Logarithmically-sound Permutation and Multiset SNARKs</a> | Bing-Jyue Chen, Lilia Tang, David Heath and Daniel Kang</p></li><li><p><a href="https://eprint.iacr.org/2025/1901">Towards Formal Verification and Corrupted Setup Security for the SwissPost Voting System</a> | Sevdenur Baloglu, Sergiu Bursuc, Reynaldo Gil-Pons and Sjouke Mauw</p></li><li><p><a href="https://eprint.iacr.org/2025/1924">Golden: Lightweight Non-Interactive Distributed Key Generation</a> | Benedikt B&#252;nz, Kevin Choi, Chelsea Komlo,</p></li><li><p><a href="https://eprint.iacr.org/2025/1893">Poseidon2b: A Binary Field Version of Poseidon2</a> | Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schr&#246;ppel</p></li><li><p><a href="https://eprint.iacr.org/2025/1897">Dynark: Making Groth16 Dynamic</a> | Tianyu Zhang, Yupeng Ouyang and Yupeng Zhang</p></li><li><p><a href="https://eprint.iacr.org/2025/1849">CoBBl: Dynamic Constraint Generation for SNARKs</a> | Kunming Jiang, Fraser Brown and Riad S. Wahby</p></li><li><p><a href="https://eprint.iacr.org/2025/1969">Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization</a> | Rachel Thomas, Oliwia Kempinski, Hari Kailad, Emma Margaret Shroyer, Ian Miers and Gabriel Kaptchuk</p></li><li><p><a href="https://eprint.iacr.org/2025/1993">A Simplified Round-by-round Soundness Proof of FRI</a> | Albert Garreta, Nicolas Mohnblatt and Benedikt Wagner</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://medium.com/@laurippeltonen/lagrange-interpolation-for-iq-200-8cec1e99647d?source=rss-5ae943ec1945------2">Lagrange Interpolation for IQ &lt; 200</a> | Lauri Peltonen</p></li><li><p><a href="https://review.stanfordblockchain.xyz/p/76-cryptography-research-spotlight">An Overview of the LatticeFold Architectural Family</a> | Stanford Blockchain Review</p></li><li><p><a href="https://blindfoldzkp.github.io/slide1.html">Blindfold</a> | Srinath Setty</p></li><li><p><a href="https://ethresear.ch/t/zkzkevm-private-evm/23315/1">Zkzkevm: private evm</a> | Barry Whitehat</p></li><li><p><a href="https://ethresear.ch/t/removing-pairing-bulletproofs-or-zkp-from-range-proof-of-pedersen-commitment/23175/1">Removing Pairing, Bulletproofs, or ZKP from Range Proof of Pedersen Commitment</a> | Leona Hioki</p></li><li><p><a href="https://gigazine.net/gsc_news/en/20251027-roc-camera-zero-knowledge-proof/">Roc Camera: A camera that can prove images aren&#8217;t AI-generated</a> | Gigazine</p></li><li><p><a href="https://x.com/0xjacobzhao/status/1982711016405528763">The Infinite Verifiable Computing Layer of zkVM and ZK Data Coprocessor</a> | Brevis</p></li><li><p><a href="https://x.com/0xabix/status/1981752917997531214">Speedrun Development with ZisK: Distributed Proof Generation</a> | Abix</p></li><li><p><a href="https://kobi.leaflet.pub/3m3pyyctda22i">Privacy Pass + x402 = blinding for x402</a> | Kobi Gurkan</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/bulletproofs-sage/">Unfolding the Bulletproofs Magic: A SageMath Deep Dive</a> | zkSecurity</p></li><li><p><a href="https://eprint.iacr.org/2025/1951">What is Cryptography Hiding from Itself?</a> | Diego F. Aranha, Nikolas Melissaris</p></li><li><p><a href="https://x.com/EliBenSasson/status/1983535877688017105">Privacy matters &#8211; Difference between TEE, ZK, MPC and FHE</a> | Eli Ben-Sasson</p></li><li><p><a href="https://github.com/solana-foundation/solana-improvement-documents/pull/388">Solana is Adding Modern ZK Syscalls</a> | Solana Foundation</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://zeroknowledge.fm/podcast/380/">ZKPassport, Obsidion &amp; the Emerging Noir Ecosystem</a> | ZK Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/381/">Payy and Payy Card, the Undoxable Credit Card</a> | ZK Podcast</p></li><li><p><a href="https://www.youtube.com/watch?v=HKKKy81hSBA">ZK Whiteboard Sessions Mod 4: </a><a href="https://youtu.be/HKKKy81hSBA?si=-qN2P8oh0LM41swm">LatticeFold</a>, w/ Binyi Chen | ZK Hack</p></li><li><p><a href="https://www.youtube.com/watch?v=GNaOgmqGxkI">ZK Whiteboard Sessions Mod 5: </a><a href="https://youtu.be/GNaOgmqGxkI?si=hLcXqql2L8G6MQZ1">The Ligero Proof System</a>, w/ Muthu Venkitasubramaniam | ZK Hack</p></li><li><p><a href="https://youtu.be/PMIjanNtE38?si=Bwle0S3PBc7GZq95">Private Zcash-to-Aztec transfer demo</a> | Aztec</p></li><li><p><a href="https://www.youtube.com/live/AT2eO_8yDz8?si=l96kkWxq7dwAyjSi">Making Zero-Knowledge Smart Contract Development Accessible, Secure &amp; Practical</a> | LF Decentralized Trust</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1876">SoK: Lookup Table Arguments</a> | Hossein Hafezi, Gaspard Anthoine, Matteo Campanelli and Dario Fiore</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/bulletproofs-intuitions/">Breaking Down Bulletproofs: No Pairings, No Trusted Setup</a> | zkSecurity</p></li><li><p><a href="https://medium.com/@laurippeltonen/lagrange-interpolation-for-iq-200-8cec1e99647d">Lagrange interpolation for IQ &lt; 200</a> | Lauri Peltonen</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/ClementWalter/rookie-numbers/blob/main/crates/sha256/src/lib.rs#L106-L156">Rookie Numbers: A new sha256 precompile</a> | ClementWalter</p></li><li><p><a href="https://aztec.network/blog/bringing-private-over-the-counter-otc-swaps-to-crypto">Bringing Private Over-The-Counter (OTC) Swaps to Crypto</a> | Aztec</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://github.com/privacy-ethereum/maci-platform/tree/main/docs/audit">MACI Platform Audit</a> | Hashcloak</p></li><li><p><a href="https://github.com/risc0/risc0/security/advisories/GHSA-jqq4-c7wq-36h7">Arbitrary code execution in guest via memory safety failure in `sys_read`</a> | RiscZero</p></li><li><p><a href="https://eprint.iacr.org/2025/1916">Graeffe-Based Attacks On Poseidon and NTT Lower Bounds</a> | Ziyu Zhao, Antonio Sanso, Giuseppe Vitto and Jintai Ding</p></li><li><p><a href="https://eprint.iacr.org/2025/1838">Fault to Forge: Fault Assisted Forging Attacks On LESS Signature Scheme</a> | Puja Mondal, Suparna Kundu, Hikaru Nishiyama, Supriya Adhikary, Daisuke Fujimoto, Yuichi Hayashi and Angshuman Karmakar</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://pse.dev/blog/pse-retreat-synthesis-report">PSE Retreat Synthesis Report</a> | PSE</p></li><li><p><a href="https://blog.ethereum.org/en/2025/10/09/new-funding-mechanisms">Supporting Privacy With New Funding Mechanisms</a> | Ethereum Foundation</p></li><li><p><a href="https://blog.succinct.xyz/nethermind-lean/">Formal Verification of SP1 Hypercube</a> | Succinct</p></li><li><p><a href="https://zisk.technology/secure-challenge-derivation-in-zisk/">Secure Challenge Derivation in ZisK</a> | ZisK</p></li><li><p><a href="https://blog.brevis.network/2025/10/17/the-brevis-guide-the-infinite-compute-layer-for-everything/">The Brevis Guide: The Infinite Compute Layer for Everything</a> | Brevis</p></li><li><p><a href="https://electriccoin.co/blog/zashi-swaps-decentralized-on-ramp-is-live/">Zashi Swaps: Decentralized On-Ramp is Live</a> | Electric Coin Company</p></li><li><p><a href="https://www.blog.citrea.xyz/citrea-fully-completes-its-audit-phase/">Citrea Fully Completes Its Audit Phase: A Major Step on the Road to Mainnet</a> | Citrea</p></li><li><p><a href="https://miden.xyz/resource/blog/miden-x-ligero">Miden x Ligero</a> | Miden &amp; Ligero</p></li><li><p><a href="https://blog.hyli.org/fibrace-results/">FibRace Benchmark Results Are Live!</a> | Hyl&#233;</p></li><li><p><a href="https://blog.succinct.xyz/private-proving/">Upgrading the Succinct Prover Network: Private Proving Is Here</a> | Succinct</p></li><li><p><a href="https://docs.rarimo.com/zk-likeness/">ZK Likeness</a> | Rarimo</p></li><li><p><a href="https://x.com/naz3eh/status/1978842616583135740">Sway Spotlight: Haven</a> | Fuel Network</p></li><li><p><a href="https://github.com/eu-digital-identity-wallet/eudi-doc-standards-and-technical-specifications/discussions/440">Specification for the implementation of Zero-Knowledge Proofs based on arithmetic circuits in the EUDI Wallet</a> | EU DID Wallet</p></li><li><p><a href="https://x.com/GetProvably/status/1981329771415163250">Provably V2 is out</a> | Provably</p></li><li><p><a href="https://x.com/axiom_xyz/status/1981427819701031228">OpenVM live on EthProofs</a> | OpenVM</p></li><li><p><a href="https://x.com/NethermindSec/status/1976319529249624283">Formal Verification of Succinct&#8217;s SP1 HyperCube zkVM</a> | Nethermind</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://eps25.web3privacy.info/">Ethereum Privacy Stack</a> from Web3privacy | Buenos Aires, Argentina. Nov 16</p></li><li><p><a href="https://luma.com/u2sw5kpv?locale=en-GB">Ethereum Cypherpunk Congress #2</a> | Buenos Aires, Argentina. Nov 16</p></li><li><p><a href="https://devconnect.org/">Devconnect</a> | Buenos Aires, Argentina. Nov 17-22</p></li><li><p><a href="https://devconnect.org/calendar">zkID Sessions</a> | Buenos Aires, Argentina. Nov 18</p></li><li><p><a href="https://devconnect.org/calendar">zkTLS Day</a> | Buenos Aires, Argentina. Nov 19</p></li><li><p><a href="https://luma.com/e9ces3lr">Encryption Day</a> | Buenos Aires, Argentina. Nov 19</p></li><li><p><a href="https://t.co/wEwPKM35vN">EthProofs Day</a> | Buenos Aires, Argentina. Nov 22</p></li><li><p><a href="https://ethglobal.com/events/buenosaires">ETHGlobal: Buenos Aires</a> | Buenos Aires, Argentina. Nov 21-23</p></li><li><p><a href="https://tcc.iacr.org/2025/">Theory of Cryptography Conference (TCC 2025)</a> Aarhus, Denmark. Dec 1-5</p></li><li><p><a href="https://asiacrypt.iacr.org/2025/">Asiacrypt</a> | Melbourne, Australia. Dec 8-12</p></li><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p>zkSummit 14 | Europe tbd. Spring/Summer 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14 2026</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: September 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-september-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-september-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Tue, 30 Sep 2025 17:02:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/29e4aad8-5c6f-4ec5-b2d6-9885206e60af_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>Each month, we bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1759">Plonk Is Simulation Extractable In ROM Under Falsifiable Assumptions</a> | Helger Lipmaa</p></li><li><p><a href="https://eprint.iacr.org/2025/1698">SNARK Lower Bounds Via Communication Complexity</a> | Rishabh Bhadauria, Alexander R. Block, Prantar Ghosh and Justin Thaler</p></li><li><p><a href="https://eprint.iacr.org/2025/1663">IVC In the Open-and-sign Random Oracle Model</a> | Mary Maller, Nicolas Mohnblatt and Arantxa Zapico</p></li><li><p><a href="https://eprint.iacr.org/2025/1588">Query-Optimal IOPPs for Linear-Time Encodable Codes</a> | Anubhav Baweja, Pratyush Mishra, Tushar Mopuri and Matan Shtepel</p></li><li><p><a href="https://eprint.iacr.org/2025/1580">IronDict: Transparent Dictionaries From Polynomial Commitments</a> | Hossein Hafezi, Alireza Shirzad, Benedikt B&#252;nz and Joseph Bonneau</p></li><li><p><a href="https://eprint.iacr.org/2025/1715">UltraMixer: A Compliant Zero-Knowledge Privacy Layer for Tokenized Real-World Assets</a> | Zonglun Li, Hong Kang and Xue Liu</p></li><li><p><a href="https://arxiv.org/pdf/2509.17126">Unaligned Incentives: Pricing Attacks Against Blockchain Rollups</a> | Stefanos Chaliasos, Conner Swann, Sina Pilehchiha, Nicolas Mohnblatt, Benjamin Livshits and Assimakis Kattis</p></li><li><p><a href="https://eprint.iacr.org/2025/1732">Zero-Knowledge AI Inference With High Precision</a> | Arman Riasi, Haodi Wang, Rouzbeh Behnia, Viet Vo and Thang Hoang</p></li><li><p><a href="https://eprint.iacr.org/2025/1646">Scalable zkSNARKs for Matrix Computations: A Generic Framework for Verifiable Deep Learning</a> | Mingshu Cong, Sherman S. M. Chow, Siu Ming Yiu and Tsz Hon Yuen</p></li><li><p><a href="https://eprint.iacr.org/2025/1653">Distributed SNARK Via Folding Schemes</a> | Zesheng Li, Dongliang Cai, Yimeng Tian, Yihang Du, Xinxuan Zhang and Yi Deng</p></li><li><p><a href="https://eprint.iacr.org/2025/1652">Computing Pairings On Elliptic Curves With Embedding Degree Two Via Biextensions</a> | Yuhao Zheng, Jianming Lin and Chang-an Zhao</p></li><li><p><a href="https://eprint.iacr.org/2025/1633">LastRings: Lattice-based Scalable Threshold Ring Signatures</a> | Sohyun Jeon, Calvin Abou Haidar and Mehdi Tibouchi</p></li><li><p><a href="https://eprint.iacr.org/2025/1593">Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash Functions</a> | G&#246;k&#231;e D&#252;zyol and Kamil Otal</p></li><li><p><a href="https://eprint.iacr.org/2025/1680">ChipmunkRing: A Practical Post-Quantum Ring Signature Scheme for Blockchain Applications</a> | Dmitrii A. Gerasimov</p></li><li><p><a href="https://eprint.iacr.org/2025/1688">SUMMER: Recursive Zero-Knowledge Proofs for Scalable RNN Training</a> | Yuange Li and Xiong Fan</p></li><li><p><a href="https://eprint.iacr.org/2025/1764">Keccacheck: towards a SNARK friendly Keccak</a> | Marcin Kostrzewa, Matthew Klein, Ara Adkins, Grzegorz &#346;wirski, and Wojciech &#379;muda</p></li><li><p><a href="https://eprint.iacr.org/2025/1767">Polylogarithmic Polynomial Commitment Scheme over Galois Rings</a> | Zhuo Wu, Xinxuan Zhang, Yi Deng, Yuanju Wei, Zhongliang Zhang and Liuyu Yang</p></li><li><p><a href="https://eprint.iacr.org/2025/1768">DualMatrix: Conquering zkSNARK for Large Matrix Multiplication</a> | Mingshu Cong, Tsz Hon Yuen and Siu-Ming Yiu</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://vitalik.eth.limo/general/2025/09/24/openness_and_verifiability.html">The importance of full-stack openness and verifiability</a> | Vitalik Buterin</p></li><li><p><a href="https://medium.com/@laurippeltonen/my-journey-to-building-a-zk-stark-prover-from-zero-ebbc7687b041?source=rss-5ae943ec1945------2">My Journey to Building a ZK (STARK) Prover From Zero</a> | Lauri Peltonen</p></li><li><p><a href="https://blog.lambdaclass.com/how-factoring-equality-polynomials-optimizes-sumcheck/">How Factoring Equality Polynomials Optimizes Sumcheck</a> | Lambda Class</p></li><li><p><a href="https://x.com/binji_x/status/1960351353118613817?s=46">The invisible upgrade: why institutions should care about crypto rails</a> | @binji_x</p></li><li><p><a href="https://x.com/tcoratger/status/1971674263485829429">EF Proofs Call #5 Summary</a> | tcoratger</p></li><li><p><a href="https://hackmd.io/Y9ehMW5MSySwzy3ercQYNw">Trustless Bitcoin Oracle with zkSPV Contract</a> | Oleksandr Kurbatov</p></li><li><p><a href="https://cryptologie.net/posts/intuitions-behind-the-range-proofs-of-bulletproof/">Intuitions Behind the Range Proofs of Bulletproof</a> | David Wong</p></li><li><p><a href="https://xn--2-umb.com/25/embedding-inner-products/">Embedding Inner Products</a> | Remco Bloemen</p></li><li><p><a href="https://www.forbes.com/sites/jonegilsson/2025/09/25/the-race-to-rewire-wall-street-is-ethereum-the-safest-bet/">The Race To Rewire Wall Street: Is Ethereum The Safest Bet?</a> | Forbes</p></li><li><p><a href="https://blog.cloudflare.com/you-dont-need-quantum-hardware/">You don&#8217;t need quantum hardware for post-quantum security</a> | Cloudfare</p></li><li><p><a href="https://x.com/alignedlayer/status/1965873398157828531">zkVMs, Circuits, and the Optimization Game</a> | Aligned Layer</p></li><li><p><a href="https://x.com/__zkhack__/status/1965389740477157724">Hash Functions 101</a> | ZK Hack</p></li><li><p><a href="https://x.com/EliBenSasson/status/1965401411455160823">It didn&#8217;t start as proofs</a> | Eli Ben-Sasson</p></li><li><p><a href="https://hackmd.io/@ZamDimon/SkFGEXbKgx">UltraGroth Protocol Explained </a>| Zam Dimon</p></li><li><p><a href="https://cryptologie.net/posts/high-level-intuitions-for-the-bulletproofsipa-protocol/">High-level intuitions for the Bulletproofs/IPA protocol</a> | David Wong</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://zkhack.dev/whiteboard/s3m1/">How to Build Hash Functions w/ Jean-Philippe (JP) Aumasson</a> | ZK Hack</p></li><li><p><a href="https://zkhack.dev/whiteboard/s3m2/">High-Performance Engineering for SNARKs, w/ Jim Posen</a> <a href="https://zkhack.dev/whiteboard/s3m2/">|</a> ZK Hack</p></li><li><p><a href="https://youtu.be/2OvCaI1rJ1A?si=1eLKVMcWwXRhxQ_6">EthProofs Call #5, Native Rollups</a> | EthProofs</p></li><li><p><a href="https://www.youtube.com/live/1zwfGdqR3fc?si=nBvwTVSOI0EElimG">David Tse: Realizing Nakamoto&#8217;s Dream: One-Time Signatures, Garbled Circuits &amp; Zero-Knowledge Proofs</a> | UC Berkeley</p></li><li><p><a href="https://youtu.be/Rb0zGLaE2VY?si=Ogy-2RDmsKb21QJ4">PlonK: The Proving Scheme on Aztec</a> | Aztec Network</p></li><li><p><a href="https://youtu.be/ERtZosATlPg?si=5vCKlIoLdAdKyZXf">Collaborative zero-knowledge proofs</a> | Tokamak ZKP World</p></li><li><p><a href="https://zeroknowledge.fm/podcast/375/">Indistinguishability Obfuscation (iO) with Huijia (Rachel) Lin</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/378/">Zerocoin to zk-creds: Modern ZK History with Ian Miers</a> | Zero Knowledge Podcast</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://zkhack.dev/whiteboard/#season3">ZK Whiteboard Sessions Season 3</a> | ZK Hack</p></li><li><p><a href="https://github.com/0xPARC/0xparc-intro-book/releases/tag/v2.0.0">Intro Book on Programmable Cryptography</a> | 0xParc</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://arxiv.org/pdf/2509.12341">Exact Coset Sampling for Quantum Lattice Algorithms</a> | Yifan Zhang</p></li><li><p><a href="https://x.com/bajpaiharsh244">Private OTC Desk on Aztec</a> | harshbajpai.eth</p></li><li><p><a href="https://eprint.iacr.org/2025/1741">Full L1 On-Chain ZK-STARK+PQC Verification On Solana: A Measurement Study</a> | Jotaro Yano</p></li><li><p><a href="https://github.com/node101-io/zkvot">zkvot - Anonymous voting application </a>| zkvot</p></li><li><p><a href="https://github.com/dl-solarity/hardhat-zkit">Hardhat ZKit</a> | DL Solarity</p></li><li><p><a href="https://zkkit.org/">ZK Kit</a> | PSE</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://x.com/rustlang_mirror/status/1970973051341963727">Crates.io malicious crates</a> | @rustlang_mirror</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/timing-kocher/">Kocher&#8217;s Timing Attack: A Journey from Theory to Practice</a> | zkSecurity</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://anoma.net/blog/upward">Upward: Shifting Innovation to the Application Layer</a> | Anoma</p></li><li><p><a href="https://ethereum-magicians.org/t/pse-roadmap-2025-and-beyond/25423">PSE is now Privacy Stewards of Ethereum </a>| PSE</p></li><li><p><a href="https://boundless.network/blog/proving-is-the-new-mining">Proving is the new mining</a> | Boundless</p></li><li><p><a href="https://zkverify.io/blog/zkverify-mainnet-and-vfy-is-live">zkVerify is Live on Mainnet!</a> | zkVerify</p></li><li><p><a href="https://aztec.network/blog/a-new-brand-for-a-new-era-of-aztec">A New Brand for a New Era of Aztec</a> | Aztec</p></li><li><p><a href="https://pse.dev/blog/const-depth-ntt-for-fhe-based-ppd">Constant-Depth NTT for FHE-Based Private Proof Delegation</a> | PSE</p></li><li><p><a href="https://www.powdr.org/blog/accelerating-ethereum-with-autoprecompiles">Accelerating Ethereum with Autoprecompiles</a> | powdr</p></li><li><p><a href="https://blog.hyli.org/fibrace-launch/">Launching FibRace: prove to win!</a> | Hyli</p></li><li><p><a href="https://x.com/hashcloak/status/1972663108196798955">Security Proofs on Serai DEX by HashCloak</a> | HashCloak</p></li><li><p><a href="https://x.com/ziskvm/status/1963503563293823187">ZisK v0.11.0 is live</a> | ZisK</p></li><li><p><a href="https://x.com/ben_a_adams/status/1970439999314149712">Building ZK Proofs for Ethereum With Nethermind Client</a> | Nethermind</p></li><li><p><a href="https://blog.brevis.network/2025/09/02/linea-boosts-growth-with-brevis-zk-powered-linea-ignition-program/">Linea Boosts Growth With Brevis ZK-Powered Linea Ignition Program</a> | Brevis</p></li><li><p><a href="https://veridise.medium.com/veridise-advancing-zk-security-two-new-publications-presented-at-cav-2025-conference-6c8f73eef13b?source=rss-d54583b14487------2">Veridise Advancing ZK Security: Two New Publications Presented at CAV 2025 Conference</a> | Veridise</p></li><li><p><a href="https://electriccoin.co/blog/private-cross-chain-payments-with-zashi-crosspay/">Private Cross-Chain Payments With Zashi CrossPay</a> | Electric Coin Company</p></li><li><p><a href="https://www.blog.citrea.xyz/1-year-of-citrea-testnet/">1 Year of Citrea Testnet</a> | Citrea</p></li><li><p><a href="https://miden.xyz/resource/blog/compiler-release-04">The Miden Compiler v0.4.0 &#8211; A Major Milestone</a> | Miden</p></li><li><p><a href="https://github.com/kkrt-labs/cairo-m/blob/main/docs/design.pdf">Cairo M Design</a> | Kakarot</p></li></ul><h4>Workshop/Education/Internships</h4><ul><li><p><a href="https://easychair.org/cfp/STABILITY-2025">STABILITY 2025: Stability Workshop</a> | Jaipur, India, December 15, 2025</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://www.decompute.org/">Decompute 2025</a> | Singapore. 30 Sept &amp; 11 Nov</p></li><li><p><a href="https://darkprague.com/">Dark Prague</a> | Prague, Czech Republic. Oct 3-5</p></li><li><p><a href="https://devconnect.org/">Devconnect</a> | Buenos Aires, Argentina. Nov 17-22</p></li><li><p><a href="https://devconnect.org/calendar">zkID Sessions</a> | Buenos Aires, Argentina. Nov 18</p></li><li><p><a href="https://devconnect.org/calendar">zkTLS Day</a> | Buenos Aires, Argentina. Nov 19</p></li><li><p><a href="https://t.co/wEwPKM35vN">EthProofs Day</a> | Buenos Aires, Argentina. Nov 22</p></li><li><p><a href="https://tcc.iacr.org/2025/">Theory of Cryptography Conference (TCC 2025)</a> | Aarhus, Denmark. Dec 1-5</p></li><li><p><a href="https://asiacrypt.iacr.org/2025/">Asiacrypt</a> | Melbourne, Australia. Dec 8-12</p></li><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p>zkSummit 14 | Europe tbd, Spring/Summer 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14 2026</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: Aug 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-aug-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-aug-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Mon, 01 Sep 2025 11:31:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6c8b8863-98a8-43f9-912b-cb0d0109e5fe_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a curated monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>Each month, we bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1473">Time-Space Trade-Offs for Sumcheck</a> | Anubhav Baweja, Alessandro Chiesa, Elisabetta Fedele, Giacomo Fenzi, Pratyush Mishra, Tushar Mopuri and Andrew Zitek-Estrada</p></li><li><p><a href="https://eprint.iacr.org/2025/1503">Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications</a> | Jens Groth, Harjasleen Malvai, Andrew Miller and Yi-Nuo Zhang</p></li><li><p><a href="https://cdn.prod.website-files.com/67cfca80708eb505376820af/68a3e174eaff71d197ac4080_glock.pdf">Glock: Garbled Locks for Bitcoin</a> | Liam Eagen</p></li><li><p><a href="https://eprint.iacr.org/2025/1446">zip: Reducing Proof Sizes for Hash-Based SNARGs</a> | Giacomo Fenzi, Yuwen Zhang</p></li><li><p><a href="https://eprint.iacr.org/2025/1500">Data Matching In Unequal Worlds and Applications to Smart Contracts</a> | Dmitry Khovratovich, Mikhail Vladimirov and Benedikt Wagner</p></li><li><p><a href="https://eprint.iacr.org/2025/1420">Coral: Fast Succinct Non-Interactive Zero-Knowledge CFG Proofs</a> | Sebastian Angel, Sof&#237;a Celi, Elizabeth Margolin, Pratyush Mishra, Martin Sander and Jess Woods</p></li><li><p><a href="https://eprint.iacr.org/2025/1422">Design ZK-NR: A Post-Quantum Layered Protocol for Legally Explainable Zero-Knowledge Non-Repudiation Attestation</a> | Minka Mi Nguidjoi Thierry Emmanuel, Mani Onana Flavien Serge, Djotio Ndi&#233; Thomas and Atsa Etoundi Roger</p></li><li><p><a href="https://eprint.iacr.org/2025/1408">qedb: Expressive and Modular Verifiable Databases (without SNARKs)</a> | Vincenzo Botta, Simone Bottoni, Matteo Campanelli, Emanuele Ragnoli and Alberto Trombetta</p></li><li><p><a href="https://eprint.iacr.org/2025/1441">DIMSEPP: A Decentralized Identity Management System with Enhanced Privacy Protection</a> | Yu Zhang and Zongbin Wang</p></li></ul><ul><li><p><a href="https://eprint.iacr.org/2025/1400">RGB I.0: Scalable Consensus for Client-side Validated Smart Contracts</a> | Maxim Orlovsky</p></li><li><p><a href="https://eprint.iacr.org/2025/1412">AVPEU: Anonymous Verifiable Presentations With Extended Usability</a> | Yalan Wang, Liqun Chen, Yangguang Tian, Long Meng and Christopher J.P. Newton</p></li><li><p><a href="https://eprint.iacr.org/2025/1413">When Can We Incrementally Prove Computations of Arbitrary Depth?</a> | Matteo Campanelli, Dario Fiore and Mahak Pancholi</p></li><li><p><a href="https://eprint.iacr.org/2025/1421">Efficient Randomized Strong $2$-source Non-malleable Extractor for Any Linear Min-entropy</a> | Divesh Aggarwal, Pranjal Dutta, Saswata Mukherjee, Satyajeet Nagargoje and Maciej Obremski</p></li><li><p><a href="https://eprint.iacr.org/2025/1434">TLShare: Private Authenticated MPC and FHE Inputs Over TLS</a> | Manuel B. Santos, Dimitris Mouris, Xiang Xie, Miguel de Vega and Andrei Lapets</p></li><li><p><a href="https://eprint.iacr.org/2025/1489">PQ-STAR: Post-Quantum Stateless Auditable Rekeying</a> | Shlomi Dolev, Avraham Yagudaev and Moti Yung</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://blog.lambdaclass.com/optimizing-sumcheck/">Optimizing Sumcheck</a> | Lambda Class</p></li><li><p><a href="https://blog.lambdaclass.com/multilinear-polynomials-survival-kit/">Multilinear Polynomials: Survival Kit</a> | Lambda Class</p></li><li><p><a href="https://kobi.leaflet.pub/3lxfc6khits27">Signature schemes you've never heard about</a> | Kobi Gurkan</p></li><li><p><a href="https://zeroknowledge.substack.com/p/so-what-are-ethproofs-really">So what are Ethproofs, really?</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://x.com/secparam/status/1960834328075571641">Are STARK/hash-based proof implementations really ZK?</a> | Ian Miers</p></li><li><p><a href="https://x.com/ebfull/status/1957112652737495475">The inner product argument </a>| Sean Bowe</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/circle-starks-3/">Circle STARKs: Part III, Circle FFT</a> | zkSecurity</p></li><li><p><a href="https://a16zcrypto.com/posts/article/6-myths-privacy-blockchains/">6 myths about privacy on blockchains</a> | a16z</p></li><li><p><a href="https://a16zcrypto.com/posts/article/jolt-6x-speedup/">Jolt gets a 6&#215; speedup &#8212; and we&#8217;re just getting started</a> | a16z</p></li><li><p><a href="https://blog.icme.io/sumcheck-good-lookups-good-jolt-good-particularly-for-zero-knowledge-machine-learning/">Sumcheck good. Lookups good. JOLT good. Particularly for zero-knowledge machine learning</a> | ICME</p></li><li><p><a href="https://ethresear.ch/t/hd-wallet-for-lattice-cryptography/22888/1">HD Wallet for Lattice Cryptography</a> | Ethresearch</p></li><li><p><a href="https://x.com/m_ratsim/status/1951156610623218146?utm_source=chatgpt.com">EU Age Verification using a Ligero-inspired solution</a> | Mamy Ratsimbazafy</p></li><li><p><a href="https://x.com/sxtvik/status/1952426731144417735">Are DID and Social Graphics a failure?</a> | Satvik</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://www.youtube.com/watch?v=rJiEV7jJFl4">Ethproofs Call #4 | enshrine RISC-V?</a> | Ethproofs</p></li><li><p><a href="https://zeroknowledge.fm/podcast/371/">How ZK inspired AI Watermarking with Miranda Christ</a> | ZK Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/372/">zkPDF and zkID with Vikas Rushi and Ying Tong</a> | ZK Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/373/">Ethproofs, zkVM Benchmarks &amp; the Unstoppable Rise of ZK with Justin Drake</a> | ZK Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/374/">Lighter, Perp DEXs and Custom ZK Circuits</a> | ZK Podcast</p></li><li><p>NYC Meetup Videos: <a href="https://www.youtube.com/playlist?list=PLzdJdAunCammoQoDFKFoK5uZZxhubzyf5">ZK Hack Meetups</a> | ZK Hack</p></li><li><p><a href="https://www.youtube.com/watch?v=miIOJFkGcY4">zkForge Bootcamp - Introduction to Zero Knowledge</a> | zkForge</p></li><li><p><a href="https://www.youtube.com/watch?v=AEU_EE4fzwY&amp;list=PLrcU8GrQN19ni4hPepaqjCyDa5F9V3d9I&amp;index=6">The Moonmath Manual to ZK-Snarks</a> | ProgCrypto (ZK) Study Group 2025</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://lmao.bearblog.dev/linear-algebra-field-extensions/">Linear algebra over field extensions</a> | Guille Angeris</p></li><li><p><a href="https://x.com/l2beat/status/1958510175100289308?s=">A public framework to evaluate trusted setups of ZK proving systems</a> | L2Beat</p></li><li><p><a href="https://jolt.a16zcrypto.com/">Jolt</a> | a16z</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/plonk-tutorial/">&#119979;&#120105;&#120108;&#120107;&#119974;: A Hands-On Deep Dive</a> | zkSecurity</p></li><li><p><a href="https://ethresear.ch/t/whir-for-ethereum/22938">WHIR for Ethereum</a> | Thomas Coratger, Giacomo Fenzi</p></li><li><p><a href="https://blog.zkverify.io/posts/my-journey-into-zk-from-html-to-a-verifiable-high-score">My Journey into ZK: From HTML to a Verifiable High Score</a> | zkVerify</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/0xandee/noir-playground">Noir Playground</a> | 0xandee</p></li><li><p><a href="https://x.com/AragonProject/status/1958138194278412798">Aragon x MACI Private Voting</a> | Aragon &amp; PSE</p></li><li><p><a href="https://github.com/NethermindEth/cartesian-merkle-tree">Cartesian Merkle Tree</a> | Nethermind</p></li><li><p><a href="https://ethresear.ch/t/zex-v0-1-confidential-peer-to-peer-dex/22949">ZEX v0.1: Confidential Peer-to-Peer DEX</a> | Ethresearch</p></li><li><p><a href="https://forum.celestia.org/t/user-centric-private-data-avalibility/2155">User-centric Private Data Availability</a> | Celestia Forum</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://x.com/p3b7_/status/1955173413992984988">Monero 51% Attack </a>| Charles Guillemet</p></li><li><p><a href="https://costa.fdi.ucm.es/web/news/CIVER_ZisK.html">Two critical soundness bugs found in ZisK</a> | COSTA research group</p></li><li><p><a href="https://x.com/RiscZero/status/1952503598056882225">RiscZero Vunerabilities</a> | RiscZero</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://medium.com/veridise/announcing-llzk-a-unified-open-source-intermediate-representation-ir-for-zero-knowledge-4e2707d53aeb?source=rss-d54583b14487------2">Announcing LLZK: A Unified, Open-source Intermediate Representation (IR) for ZK</a> | Veridise</p></li><li><p><a href="https://x.com/ensue_ai/status/1958553325223165996">Ensue Made Public</a> | Ensue</p></li><li><p><a href="https://penumbralabs.xyz/">Penumbra Labs Winding Down</a> | Penumbra</p></li><li><p><a href="https://x.com/SuccinctLabs/status/1960331559262978473">ZK proving on Arbitrum chains</a> | Succinct</p></li><li><p><a href="https://beboundless.xyz/blog/introducing-zk-coin">Introducing ZK Coin</a> | Boundless</p></li><li><p><a href="https://anoma.net/blog/introducing-anomapay">Introducing AnomaPay: A Secure, Global Stablecoin Router and Payments Network</a> | Anoma</p></li><li><p><a href="https://x.com/payy_link/status/1953093856326762639">Introducing Payy Card</a> | Payy</p></li><li><p><a href="https://www.alpenlabs.io/blog/glock-is-here">Glock is here</a> | Alpen Labs</p></li><li><p><a href="https://zorp.io/blog/bundling">Strategic Bundling, the Antidote to Modular Complexity</a> | Zorp</p></li><li><p><a href="https://aleo.org/post/aleo-token-revolut-listing/">Aleo Token to be Listed in Revolut</a> | Aleo</p></li><li><p><a href="https://x.com/zashi_app/status/1961060025964667311">Decentralized Off-Ramp for Shielded ZEC</a> | Zashi</p></li><li><p><a href="https://delphinuslab.com/2025/08/26/the-zkwasm-tokenomics-cycle/">The ZKWASM Tokenomics Cycle</a> | Delphinus Labs</p></li><li><p><a href="https://blog.kakarot.org/the-age-of-proof-building-privacy-first-age-verification-infrastructure-for-the-web-c49f49541c13?source=rss----b01b36446f27---4">The Age of Proof: Building Privacy-First Age Verification Infrastructure for the Web</a> | Kakarot</p></li><li><p><a href="https://blog.hyli.org/introducing-the-hyli-guide/">Introducing the Hyli Guide</a> | Hyl&#233;</p></li><li><p><a href="https://blog.brevis.network/2025/08/25/infinite-verifiable-compute-comes-to-linea/">Infinite Verifiable Compute Comes to Linea</a> | Brevis</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://buildersweekistanbul.com/">Builders Week Istanbul</a> | Istanbul, Turkey. Sept 1 - 7, 2025</p></li><li><p><a href="https://www.decompute.org/">Decompute 2025</a> | 30 Sept &amp; 11 Nov 2025</p></li><li><p><a href="https://devconnect.org/">Devconnect</a> | Buenos Aires, Argentina. Nov 17-22, 2025</p></li><li><p><a href="https://devconnect.org/calendar">zkID Sessions</a> | Buenos Aires, Argentina. Nov 18, 2025</p></li><li><p><a href="https://devconnect.org/calendar">zkTLS Day</a> | Buenos Aires, Argentina. Nov 19, 2025</p></li><li><p><a href="https://t.co/wEwPKM35vN">EthProofs Day</a> | Buenos Aires, Argentina. Nov 22, 2025</p></li><li><p><a href="https://rwc.iacr.org/2026/">RWC 2026</a> | Taipei, Taiwan. March 9&#8211;11, 2026</p></li><li><p>zkSummit 14 | Europe tbd, Spring/Summer 2026</p></li><li><p><a href="https://eurocrypt.iacr.org/2026/">Eurocrypt</a> | Rome, Italy. May 10-14 2026</p></li><li><p><a href="https://tcc.iacr.org/2025/">Theory of Cryptography Conference (TCC 2025)</a> Aarhus, Denmark. Dec 1-5, 2025</p></li><li><p><a href="https://asiacrypt.iacr.org/2025/">Asiacrypt</a> | Melbourne, Australia. Dec 8-12, 2025</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! </p><p>Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: July 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-july-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-july-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Thu, 31 Jul 2025 19:24:47 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/62f17543-dc7a-4ef0-a462-fcc09cef4e37_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>We bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. Expect a new edition every month. Be sure to share and <a href="https://zkmesh.substack.com/">subscribe</a>!<br><br>** Looking to hire in ZK? Add your job to the <a href="https://jobsboard.zeroknowledge.fm/">ZK Jobs Board</a> today! ** </p><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1368">Post-Quantum Readiness In EdDSA Chains</a> | Foteini Baldimtsi, Konstantinos Chalkias and Arnab Roy</p></li><li><p><a href="https://eprint.iacr.org/2025/1325">Revisiting the IPA-sumcheck Connection</a> | Liam Eagen and Ariel Gabizon</p></li><li><p><a href="https://eprint.iacr.org/2025/1323">Pairing-Based Batch Arguments for NP With a Linear-Size CRS</a> | Binyi Chen, Noel Elias and David J. Wu</p></li><li><p><a href="https://eprint.iacr.org/2025/1254">Batch Decryption Without Epochs and Its Application to Encrypted Mempools</a> | Dan Boneh, Evan Laufer and Ertem Nusret Tas</p></li><li><p><a href="https://eprint.iacr.org/2025/1216">Ring-LWR Based Commitments and ZK-PoKs With Application to Verifiable Quantum-Safe Searchable Symmetric Encryption</a> | Debadrita Talapatra, Nimish Mishra and Debdeep Mukhopadhyay</p></li><li><p><a href="https://eprint.iacr.org/2025/1214">Hobbit: Space-Efficient zkSNARK With Optimal Prover Time</a> | Christodoulos Pappas and Dimitrios Papadopoulos</p></li><li><p><a href="https://eprint.iacr.org/2025/1269">Linear Prover IOPs in Log Star Rounds</a> | Noor Athamnah, Noga Ron-Zewi, and Ron D. Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2025/1266">Efficiently Parsing Existing eID Documents for Zero-knowledge Proofs</a> | Tom Godden, Ruben De Smet, Kris Steenhaut and An Braeken</p></li><li><p><a href="https://eprint.iacr.org/2025/1366">NOPE: Strengthening Domain Authentication With Succinct Proofs</a> | Zachary DeStefano, Jeff J. Ma, Joseph Bonneau and Michael Walfish</p></li><li><p><a href="https://eprint.iacr.org/2025/1364">A Framework for Witness Encryption From Linearly Verifiable SNARKs and Applications</a> | Sanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli and Guru-Vamsi Policharla</p></li><li><p><a href="https://eprint.iacr.org/2025/1220">RoK and Roll &#8211; Verifier-Efficient Random Projection for &#213;(&#955;)-size Lattice Arguments</a> | Michael Kloo&#223;, Russell W. F. Lai, Ngoc Khanh Nguyen and Micha&#322; Osadnik</p></li><li><p><a href="https://eprint.iacr.org/2025/1285">FRIttata: Distributed Proof Generation of FRI-based SNARKs</a> | Hua Xu, Mariana Gama, Emad Heydari Beni and Jiayi Kang</p></li><li><p><a href="https://eprint.iacr.org/2025/1354">Shred-to-Shine Metamorphosis In Polynomial Commitment Evolution</a> | Weihan Li, Zongyang Zhang, Sherman S. M. Chow, Yanpei Guo, Boyuan Gao, Xuyang Song, Yi Deng and Jianwei Liu</p></li><li><p><a href="https://eprint.iacr.org/2025/1253">BitVM with Succinct On-Chain Cost from AB-LFE, HMAC, or Privacy-Free GC</a> | Weikeng Chen</p></li><li><p><a href="https://eprint.iacr.org/2025/1349">HyperFond: A Transparent and Post-Quantum Distributed SNARK With Polylogarithmic Communication</a> | Yuanzhuo Yu, Mengling Liu, Yuncong Zhang, Shi-Feng Sun, Tianyi Ma, Man Ho Au and Dawu Gu</p></li><li><p><a href="https://eprint.iacr.org/2025/1294">Interstellar: GKR Protocol Based Low Prover Cost Folding Scheme for Circuit Satisfiability</a> | Jieyi Long</p></li><li><p><a href="https://eprint.iacr.org/2025/1296">G&#246;del In Cryptography: Effectively Zero-Knowledge Proofs for NP With No Interaction, No Setup, and Perfect Soundness</a> | Rahul Ilango</p></li><li><p><a href="https://eprint.iacr.org/2025/1311">Batch Subgroup Membership Testing On Pairing-friendly Curves</a> | Dimitri Koshelev, Youssef El Housni and Georgios Fotiadis</p></li><li><p><a href="https://eprint.iacr.org/2025/1276">On Weak NIZKs, One-way Functions and Amplification</a> | Suvradip Chakraborty, James Hulett and Dakshita Khurana</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://medium.com/veridise/identifying-common-vulnerabilities-in-zkvms-ee81539bcc64?source=rss-d54583b14487------2">Identifying Common Vulnerabilities In zkVMs</a> | Veridise</p></li><li><p><a href="https://core.taceo.io/articles/mpc-kyc/">Rewriting KYC with MPC</a> | TACEO </p></li><li><p><a href="https://blog.zksecurity.xyz/posts/snarksentinel/">Bug Hunt: Zero-Knowledge, Full-Paranoia, and the AI That Stares Back </a>| zksecurity</p></li><li><p><a href="https://psychovirtual.io/posts/thesis/">The Future of Verified Computation</a> | Psycho Virtual</p></li><li><p><a href="https://blog.icme.io/verifiable-ai-memory-when-ai-remembers-who-controls-the-truth/">Verifiable AI Memory</a> | ICME</p></li><li><p><a href="https://pse.dev/blog/mopro-metal-msm-v2">Metal MSM v2: Exploring MSM Acceleration on Apple GPUs</a> | PSE</p></li><li><p><a href="https://www.coindesk.com/tech/2025/07/23/dogecoin-could-soon-verify-zk-proofs-natively-thanks-to-dogeos-push">Dogecoin Could Soon Verify ZK Proofs Natively, Thanks to DogeOS Push</a> | Coindesk</p></li><li><p><a href="https://www.nethermind.io/blog/our-first-deep-dive-into-noir-what-zk-auditors-learned">Our First Deep Dive into Aztec's Noir Language, What ZK Auditors Learned</a> | Nethermind</p></li><li><p><a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Digital-Assets-Report-EO14178.pdf">The US Digital assets report (mentions zk on page 116)</a> | Whitehouse.gov</p></li><li><p><a href="https://blog.ethereum.org/en/2025/07/10/realtime-proving">Shipping an L1 zkEVM #1: Realtime Proving</a> | Ethereum Foundation</p></li><li><p><a href="https://www.zellic.io/blog/introducing-polocolo">Introducing Polocolo: A ZK-Friendly Hash Function for PLONK with Lookup (Part 1)</a> | Zellic</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://www.youtube.com/watch?v=_EmGKQR9oJg&amp;list=PLSsVHWrO8Yh0FJ8ntD0nLa4S7xx0XSbOQ&amp;index=2">Privacy Invariants in Digital Identity</a> | Dappcon</p></li><li><p><a href="https://zeroknowledge.fm/podcast/366/">Bringing ID Onchain with Self</a> | ZKPodcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/367/">Local-First with grjte and Goblin Oats</a> | ZKPodcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/369/">Ligero for Memory-Efficient ZK with Muthu</a> | ZKPodcast</p></li><li><p><a href="https://simons.berkeley.edu/workshops/proofs/schedule#simons-tabs">Cryptography 10 Years Later: Obfuscation, Proof Systems, and Secure Computation schedule</a> (includes videos) | Simons Berkeley</p></li><li><p><a href="https://www.youtube.com/watch?v=oCANLFSCPq8">Vitalik Buterin on Ethereum Privacy</a> | @Web3Privacy hackathon</p></li><li><p><a href="https://www.youtube.com/playlist?list=PLJqWcTqh_zKEwDCbJ31ds3VSIxa4rUxvF">Beam day</a> (playlist) | Ethereum Foundation</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://medium.com/veridise/how-to-write-and-audit-a-secure-zkvm-application-a-practical-example-with-risc-zero-08d76f54ebb0?source=rss-d54583b14487------2">How to Write and Audit a Secure zkVM Application: A Practical Example With RISC Zero</a> | Veridise</p></li><li><p><a href="https://blog.lambdaclass.com/gkr-protocol-implementation-deep-dive-into-the-code/">GKR Protocol Implementation: Deep Dive Into the Code</a> | Lambda Class</p></li><li><p><a href="https://alinush.github.io/dekart">DeKART: How to prove many ranges in zero-knowledge</a><a href="https://alinush.github.io/mle">)</a> | Alin Tomescu</p></li><li><p><a href="https://alinush.github.io/hyrax">Hyrax polynomial commitment scheme</a><a href="https://alinush.github.io/mle">)</a> | Alin Tomescu</p></li><li><p><a href="https://alinush.github.io/kzh">KZH polynomial commitments</a><a href="https://alinush.github.io/mle">)</a> | Alin Tomescu</p></li><li><p><a href="https://alinush.github.io/mle">Multilinear polynomials and multilinear extensions (MLEs)</a> | Alin Tomescu</p></li><li><p><a href="https://hackmd.io/@Ingonyama/fast-labrador-prover">Let's Labrador</a> | Ingonyama</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/ingonyama-zk/icicle/releases/tag/v4.0.0">ICICLE v4.0.0</a> | Ingonyama</p></li><li><p><a href="https://github.com/ligeroinc/ligero-prover">Ligero Prover released</a> | Ligero</p></li><li><p><a href="https://github.com/SoundnessLabs/zkvm-examples">zkVM Examples</a> | Soundness</p></li><li><p><a href="https://github.com/seichris/network-requests-extension">Network Request Analyzer Extension</a>  | seichris</p></li><li><p><a href="https://docs.attest.org/docs/category/zk-playbook">ZK Playbook</a> | Ethereum Attestation Service</p></li><li><p><a href="https://github.com/google/longfellow-zk">Longfellow ZK</a> | Google</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://pse.dev/blog/under-constrained-bug-in-binary-merkle-root-circuit-fixed-in-v200">Under-Constrained Bug in BinaryMerkleRoot Circuit (Fixed in v2.0.0)</a> | PSE</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/halo2-query-collision/">Uncovering the Query Collision Bug in Halo2: How a Single Extra Query Breaks Soundness </a>| zksecurity</p></li><li><p><a href="https://eprint.iacr.org/2025/1353">Introducing Two ROS Attack Variants: Breaking One-more Unforgeability of BZ Blind Signatures</a> | Bruno M. F. Ricardo, Lucas C. Cardoso, Leonardo T. Kimura, Paulo S. Barreto and Marcos A. Simplicio Jr</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://pse.dev/blog/pse-july-2025-newsletter">July 2025 Newsletter</a> | PSE</p></li><li><p><a href="https://ligero-inc.com/kyc-aml">Reshaping KYC/AML in Web3 </a>| Ligero</p></li><li><p><a href="https://core.taceo.io/articles/taceo-proof-prod/">TACEO:Proof is live in Production</a> | Taceo</p></li><li><p><a href="https://aleo.org/post/announcing-snarkOS-v4.0.0/">Aleo announces biggest upgrade since mainnet</a> | Aleo</p></li><li><p><a href="https://beboundless.xyz/blog/mainnet-beta">Boundless Mainnet Beta is Live</a> | Boundless</p></li><li><p><a href="https://self.xyz/blog/google-cloud-x-self">Google Cloud Integrates with Self to Power AI Adoption &amp; Web3 Innovation by Human Users</a> | Self</p></li><li><p><a href="https://self.xyz/blog/self-now-supports-eu-id-scanning-for-identity-verification">Self Now Supports EU ID Scanning for Identity Verification</a> | Self</p></li><li><p><a href="https://x.com/ziskvm/status/1948810226746228912">Zisk v0.10.0 is out</a> | Zisk</p></li><li><p><a href="https://blog.hyli.org/martian-testnet-retro/">Testnet Retro: A Small Slice for You, a Giant Leap for Hyli!</a> | Hyli</p></li><li><p><a href="https://aztec.network/blog/aztec-enters-new-phase-of-its-public-testnet-introducing-the-adversarial-testnet">Aztec Enters New Phase of Its Public Testnet: Introducing the Adversarial Testnet</a> | Aztec</p></li><li><p><a href="https://blog.succinct.xyz/sp1-cc/">Introducing SP1-CC: Unleashing the Full Power of the EVM</a> | Succinct</p></li><li><p><a href="https://www.blog.citrea.xyz/citreas-role-in-achieving-verification-on-bitcoin-with-bitvm/">Citrea&#8217;s Role In Achieving Verification On Bitcoin With BitVM</a> | Citrea</p></li><li><p><a href="https://www.ingonyama.com/post/imp1-bringing-zero-knowledge-proofs-to-mobile">IMP1: Bringing Zero-Knowledge Proofs to Mobile</a> | Ingonyama</p></li><li><p><a href="https://anoma.net/blog/the-anoma-testnet-is-live">The Anoma Testnet is Live!</a> | Anoma</p></li><li><p><a href="https://starkware.co/blog/kakarot-x-s-two-bringing-zk-to-everyday-devices/">Kakarot x S-two: Bringing ZK to everyday devices</a> | StarkWare</p></li><li><p><a href="https://www.o1labs.org/blog/learning-how-to-learn-o1js">How to learn o1js</a> | o1labs</p></li><li><p><a href="https://zksync.mirror.xyz/Kj2ENEQP7-kEMX4bVA7OxdXUn3Xog8sIrXf42MJJ3bM">Diving Deep into the Stack &#8212; But Not Too Deep</a> | zkSync</p></li></ul><h4>Bootcamp/Education/Internships</h4><ul><li><p><a href="https://ascrypto.org/2025/">ASCrypto 2025</a></p></li><li><p><a href="https://zkmonk.org/bootcamp-zkForge-2025">zkFORGE Bootcamp 2025</a></p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://www.sbc-conference.com/2025/">The Science of Blockchain Conference (SBC) 2025</a> | Berkeley, USA. August 4 - 6, 2025</p></li><li><p><a href="https://eccworkshop.org/2025/index.html">Workshop on Elliptic Curve Cryptography ECC 2025</a> - Aug 11, 2025 (virtual)</p></li><li><p><a href="https://ethglobal.com/events/newyork2025">ETH Global New York 2025</a> | NYC, USA. August 15 - 17, 2025</p></li><li><p><strong><a href="https://lu.ma/m03iuhyw">ZK Hack meetup</a> | NYC, USA. August 17, 2025</strong></p></li><li><p><a href="https://buildersweekistanbul.com/">Builders Week Istanbul</a> | Istanbul, Turkey. September 1 - 7, 2025</p></li><li><p><a href="https://devconnect.org/">Devconnect</a> | Buenos Aires, Argentina. November 17-22, 2025</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: June 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-june-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-june-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Mon, 30 Jun 2025 14:17:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/78756089-aba6-424a-8afa-72b3df0e3ee1_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>We bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. Expect a new edition every month. Be sure to share and <a href="https://zkmesh.substack.com/">subscribe</a>!</p><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/1061">On the Adaptive Security of FROST</a> | Elizabeth Crites, Jonathan Katz, Chelsea Komlo, Stefano Tessaro and Chenzhi Zhu</p></li><li><p><a href="https://eprint.iacr.org/2025/1026">Malicious Security In Collaborative zk-SNARKs: More Than Meets the Eye</a> | Sanjam Garg, Aarushi Goel, Abhishek Jain, Bhaskar Roberts and Sruthi Sekar</p></li><li><p><a href="https://eprint.iacr.org/2025/1117">Speeding Up Sum-Check Proving</a> | Suyash Bagad, Quang Dao, Yuval Domb and Justin Thaler</p></li><li><p><a href="https://eprint.iacr.org/2025/1159">DekartProof: Efficient Vector Range Proofs and Their Applications</a> | Dan Boneh, Trisha Datta, Rex Fernando, Kamilla Nazirkhanova and Alin Tomescu</p></li><li><p><a href="https://eprint.iacr.org/2025/1110">A Framework for Compiling Custom Languages As Efficiently Verifiable Virtual Machines</a> | Assimakis A. Kattis, Brian Klatt, Philip Quirk and Logan Allen</p></li><li><p><a href="https://eprint.iacr.org/2025/1015">Zero-Knowledge Polynomial Commitment In Binary Fields</a> | Benjamin E. Diamond</p></li><li><p><a href="https://eprint.iacr.org/2025/1037">Committed Vector Oblivious Linear Evaluation and Its Applications</a> | Yunqing Sun, Hanlin Liu, Kang Yang, Yu Yu, Xiao Wang and Chenkai Weng</p></li><li><p><a href="https://eprint.iacr.org/2025/1062">TrafficProof: Privacy-Preserving Reliable Traffic Information Sharing In Social Internet of Vehicles</a> | Stefan Dziembowski, Shahriar Ebrahimi, Parisa Hassanizadeh and Susil Kumar Mohanty</p></li><li><p><a href="https://eprint.iacr.org/2025/1056">Private Signaling Secure Against Actively Corrupted Servers</a> | Haotian Chu, Xiao Wang and Yanxue Jia</p></li><li><p><a href="https://eprint.iacr.org/2025/1085">SmallWood: Hash-Based Polynomial Commitments and Zero-Knowledge Arguments for Relatively Small Instances</a> | Thibauld Feneuil and Matthieu Rivain</p></li><li><p><a href="https://eprint.iacr.org/2025/1024">Towards Trustless Provenance: A Privacy-Preserving Framework for On-chain Media Verification</a> | Piotr Miko&#322;ajczyk, Parisa Hassanizadeh and Shahriar Ebrahimi</p></li><li><p><a href="https://eprint.iacr.org/2025/1113">Computational Attestations of Polynomial Integrity Towards Verifiable Back-Propagation</a> | Dustin Ray and Caroline El Jazmi</p></li><li><p><a href="https://eprint.iacr.org/2025/1022">Burn Your Vote: Decentralized and Publicly Verifiable Anonymous Voting at Scale</a> | Stefan Dziembowski, Shahriar Ebrahimi, Haniyeh Habibi, Parisa Hassanizadeh and Pardis Toolabi</p></li><li><p><a href="https://eprint.iacr.org/2025/1147">Jigsaw: Doubly Private Smart Contracts</a> | Sanjam Garg, Aarushi Goel, Dimitris Kolonelos and Rohit Sinha</p></li><li><p><a href="https://eprint.iacr.org/2025/1146">QV-net: Decentralized Self-Tallying Quadratic Voting With Maximal Ballot Secrecy</a> | Zibo Zhou, Zongyang Zhang, Feng Hao, Bowen Zheng and Zulkarnaim Masyhur</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://zkhack.dev/2025/06/26/zk-hack-berlin/">ZK Hack Berlin Wrap-Up</a> | ZK Hack</p></li><li><p><a href="https://x.com/secparam/status/1938063395531391380">zk-promises: Anonymous Moderation, Reputation, and Blocking from Anonymous Credentials with Callbacks</a> | Ian Miers (X thread)</p></li><li><p><a href="https://baincapitalcrypto.com/a-deep-dive-into-logjumps-a-faster-modular-reduction-algorithm/">A Deep Dive into Logjumps: a Faster Modular Reduction Algorithm</a> | Bain Capital Crypto</p></li><li><p><a href="https://pse.dev/blog/efficient-client-side-proving-for-zkid">Efficient Client-Side Proving for zkID</a> | PSE</p></li><li><p><a href="https://pse.dev/blog/zkpdf-unlocking-verifiable-data">zkPDF: Unlocking Verifiable Data in the World's Most Popular Document Format</a> | PSE</p></li><li><p><a href="https://medium.com/veridise/an-introduction-to-zero-knowledge-virtual-machines-zkvms-0e94b8023bca?source=rss-d54583b14487------2">An Introduction to Zero-knowledge Virtual Machines (zkVMs)</a> | Veridise</p></li><li><p><a href="https://vitalik.eth.limo/general/2025/06/28/zkid.html">Does digital ID have risks even if it's ZK-wrapped?</a> | Vitalik Buterin</p></li><li><p><a href="https://hackmd.io/@0xdeveloperuche/rkd1vBsElx">Deconstructing the 1.5 GHz zkVM: How ZisK Redefined the Limits of Trace Generation</a> | Developer Uche</p></li><li><p><a href="https://blog.icme.io/folding-schemes-in-the-lattice-setting-pay-per-bit-and-ntts/?ref=icme-newsletter">Folding schemes in the lattice setting: pay-per-bit and NTTs</a> | Alberto Centelles, ICME</p></li><li><p><a href="https://blog.icme.io/verifiable-ai-moving-from-a-black-box-to-a-glass-house/">Verifiable AI: Moving From a Black Box To a Glass House</a> | Wyatt Benno, ICME</p></li><li><p><a href="https://x.com/badcryptobitch/status/1931379622303719580">CoSNARKs are overrated!</a> | Mikerah (X thread)</p></li><li><p><a href="https://yuriko.io/posts/capture-hidden-trends/">Capture Hidden Trends - Use Cases for Private and Decentralized ML Training</a> | Indefinite / Yuriko</p></li><li><p><a href="https://blog.lambdaclass.com/bitvm-enabling-efficient-verifiable-computation-in-bitcoin/">BitVM: enabling efficient verifiable computation in Bitcoin</a> | Lambda Class</p></li><li><p><a href="https://hexens.io/blog/subgroup-attack-exploits">Subgroup Pitfalls in zk-Proofs and Real-World Exploits</a> | Hexens</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/greyhound/">Proofs On A Leash: Post-Quantum Lattice SNARK With Greyhound</a> | zkSecurity</p></li><li><p><a href="https://news.dyne.org/longfellow-zero-knowledge-google-zk/">The Longfellow ZK (Google-zk)</a> | Dyne</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://x.com/ZuBerlinCity/status/1934894725175365802">Cryptography Day</a> | ZuBerlin</p></li><li><p><a href="https://x.com/i/broadcasts/1yoJMoEydzRKQ">25 zkVMs: Too few or too many?</a> | Miden at ZuBerlin</p></li><li><p><a href="https://zeroknowledge.fm/podcast/365/">ZK in Sui &amp; zkAt with Kostas Kryptos</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://open.spotify.com/episode/4XiH85mZgQUVdhcz6MDHbg">Hyli: Building a Blockchain Around Proofs</a> | Snark Chocolate</p></li><li><p><a href="https://open.spotify.com/episode/4KmnGMEi9ptqmhZth2g7Wp">Giza Tech: verifiable ML and Agents</a> | Snark Chocolate</p></li><li><p><a href="https://zeroknowledge.fm/podcast/364/">AI and ZK Auditing with David Wong</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/363/">Bringing ZK to Google Wallet with Abhi and Matteo</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/362/">zkTLS with Maddy from Reclaim</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://www.zama.ai/post/video-tutorial-introducing-zamas-hardware-accelerator-for-fhe-hpu-on-fpga">[Video Tutorial] Introducing Zama&#8217;s Hardware Accelerator for FHE - HPU on FPGA</a> | Zama</p></li><li><p><a href="https://medium.com/veridise/designing-secure-zkvm-applications-a-fireside-chat-with-rami-khalil-risc-zero-6247a3410110?source=rss-d54583b14487------2">Designing Secure zkVM Applications: A Fireside Chat With Rami Khalil (RISC Zero)</a> | Veridise</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://updraft.cyfrin.io/courses/noir-programming-and-zk-circuits">Noir Programming And ZK Circuits course</a> | Cyfrin Updraft</p></li><li><p><a href="https://www.zellic.io/blog/bls-signature-versatility">What Are BLS Signatures and How Do They Work?</a> | Zellic</p></li><li><p><a href="https://www.vlayer.xyz/blog/whitepaper-alert-exploring-keccak-hashes-in-zero-knowledge-with-gkr">Whitepaper Alert: Exploring Keccak Hashes in Zero-Knowledge with GKR</a> | vlayer</p></li><li><p><a href="https://hackmd.io/@leoalt/best-isa-ethereum">What is the best ISA for Ethereum?</a> - Leo Alt</p></li><li><p><a href="https://blog.lambdaclass.com/our-succinct-explanation-of-jagged-polynomial-commitments/">Our Succinct Explanation of Jagged Polynomial Commitments</a> | Lambda Class</p></li><li><p><a href="https://blog.lambdaclass.com/an-introduction-to-merkle-patricia-trie/">An Introduction to Merkle Patricia Trie</a> | Lambda Class</p></li><li><p><a href="https://blog.lambdaclass.com/the-fields-powering-binius/">The Fields Powering Binius</a> | Lambda Class</p></li><li><p><a href="https://blog.lambdaclass.com/additive-fft-background/">Additive FFT: Background</a> | Lambda Class</p></li><li><p><a href="https://blog.lambdaclass.com/diving-deep-into-binius-m3-arithmetization-using-merkle-tree/">Diving Deep Into Binius M3 Arithmetization Using Merkle Tree Inclusion As an Example</a> | Lambda Class</p></li><li><p><a href="https://eprint.iacr.org/2025/1169">Understanding Lasso: A Novel Lookup Argument Protocol</a> | Oleg Fomenko and Anton Levochko</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://github.com/arkworks-rs/algebra/pull/961">Use Extended Jacobian Coordinates for SW MSM</a> | arkworks::algebra</p></li><li><p><a href="https://github.com/arkworks-rs/algebra/pull/995">Improves the performance of VariableBaseMSM when scalars are small</a> | arkworks::algebra</p></li><li><p><a href="https://t.co/Hx2BMnBYKG">List of Common Acronyms</a> | ZK Jargon Decoder</p></li><li><p><a href="https://mirror.xyz/0x90699B5A52BccbdFe73d5c9F3d039a33fb2D1AF6/T4lHiBlo7VoYp-5SEuitQnY7_ullpwkZbanOOwjeZI4">Implementing Lookups in Groth: The second secret ingredient to reduce Bionetta&#8217;s constraints</a> | Rarimo</p></li><li><p><a href="https://eprint.iacr.org/2025/1103">Universally Composable Succinct Vector Commitments and Applications</a> | Ran Canetti and Megan Chen</p></li></ul><h4>Bootcamp/Education/Internships</h4><ul><li><p><a href="https://zkmonk.org/bootcamp-zkForge-2025">zkForge Bootcamp 2025</a>, by ZK Monk</p></li><li><p><a href="https://blog.ethereum.org/en/2025/06/12/season-of-internships">Now Accepting Interns - Join the Ethereum Season of Internships</a> | Ethereum Foundation</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://blog.zksecurity.xyz/posts/solana-phantom-challenge-bug/">Uncovering the Phantom Challenge Soundness Bug in Solana's ZK ElGamal Proof Program</a> | zkSecurity</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://x.com/ziskvm/status/1935307212282593503">Introducing ZisK &#8212; a new era for zero-knowledge proof systems</a> | ziskvm</p></li><li><p><a href="https://blog.eigencloud.xyz/verifiable-ai-for-crypto-governance-sentient/">Verifiable AI for Crypto Governance: A Research Collaboration With Sentient</a> | EigenLayer</p></li><li><p><a href="https://www.nockchain.org/nockvm/">NockVM: A Minimal ZKVM for General-Purpose Verifiable Computing</a> | Nockchain</p></li><li><p><a href="https://zksync.mirror.xyz/ZgRmbYA_EE3wfGcXWv81m-xcED-ppNKkRzkleS6YZRc">Introducing ZKsync Airbender: The World&#8217;s Fastest Open-Source RISC-V zkVM</a> | ZKsync</p></li><li><p><a href="https://www.fermah.xyz/blog-posts/proof-aggregation">Proof Aggregation</a> | Fermah</p></li><li><p><a href="https://www.fermah.xyz/blog-posts/critical-for-the-zk-endgame">The Universal Proof Market: A Critical Ingredient for the ZK Endgame</a> | Fermah</p></li><li><p><a href="https://x.com/LineaBuild/status/1932172959587913816">Linea Is Now 100% Proven</a> | Linea</p></li><li><p><a href="https://blog.hyli.org/deep-dive-wallet/">Deep Dive: The Hyli Wallet Abstracts Your Identity</a> | Hyli</p></li><li><p><a href="https://blog.hyli.org/the-hyli-testnet-is-live/">The Hyli Testnet Is Live!</a> | Hyli</p></li><li><p><a href="https://blog.hyli.org/deep-dive-ezkasino/">Deep Dive: eZKasino, Fully-proven Blackjack</a> | Hyli</p></li><li><p><a href="https://blog.succinct.xyz/hibachi/">Succinct and Hibachi Are Building the Endgame Exchange</a> | Succinct</p></li><li><p><a href="https://blog.eigencloud.xyz/introducing-eigencloud/">Introducing EigenCloud, a Developer Platform to Unlock Crypto's App Era</a> | EigenLayer</p></li><li><p><a href="https://blog.eigencloud.xyz/eigencloud-technical-blog/">EigenCloud: Cloud-Scale Programmability, Crypto-Grade Verifiability</a> | EigenLayer</p></li><li><p><a href="https://www.zama.ai/post/announcing-the-zama-confidential-blockchain-protocol">Announcing the Zama Confidential Blockchain Protocol and Our Series B</a> | Zama</p></li><li><p><a href="https://aztec.network/blog/stealthnote-the-decentralized-private-glassdoor-of-web3">StealthNote: The Decentralized, Private Glassdoor of Web3</a> | Aztec</p></li><li><p><a href="https://www.blog.citrea.xyz/clementine-v2-with-garbled-circuits-and-toop/">R&amp;D for Clementine V2: Eliminating Collateral and Liquidity Requirements With Garbled Circuits and TOOP</a> | Citrea</p></li><li><p><a href="https://pse.dev/blog/ethereum-privacy-pir">Ethereum Privacy: Private Information Retrieval</a> | PSE</p></li><li><p><a href="https://blog.availproject.org/native-zk-verification-unlocks-hyper-scalable-execution/">Native ZK Verification Unlocks Hyper Scalable Execution</a> | Avail</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://ethcc.io/">ETHCC</a> | Cannes, France. June 30 - July 3, 2025</p></li><li><p><a href="https://www.napuleth.org/">NapulETH</a> | Napoli, Italy. July 17 - 19, 2025</p></li><li><p><a href="https://www.edcon.io/en/">Edcon 2025</a> | Osaka, Japan. July 31 - August 1, 2025</p></li><li><p><a href="https://www.sbc-conference.com/2025/">The Science of Blockchain Conference (SBC) 2025</a> | Berkeley, CA, USA. August 4 - 6, 2025</p></li><li><p><a href="https://ethglobal.com/events/newyork2025">ETH Global New York 2025</a> | New York City, USA. August 15 - 17, 2025</p></li><li><p><a href="https://eccworkshop.org/2025/index.html">Workshop on Elliptic Curve Cryptography ECC 2025</a> - August 11, 2025 (online)</p></li><li><p><a href="https://buildersweekistanbul.com/">Builders Week Istanbul</a> | Istanbul, Turkey. September 1 - 7, 2025</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ZK Mesh: May 2025 Recap]]></title><description><![CDATA[Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.]]></description><link>https://zkmesh.substack.com/p/zk-mesh-may-2025-recap</link><guid isPermaLink="false">https://zkmesh.substack.com/p/zk-mesh-may-2025-recap</guid><dc:creator><![CDATA[Zk Hack]]></dc:creator><pubDate>Sat, 31 May 2025 13:35:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9b8d0d49-ce15-444f-b4d4-5c8ed7925fd8_1024x1024.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to ZK Mesh, a monthly newsletter covering the latest in advanced privacy-enhancing cryptography, distributed protocol development, and zero-knowledge systems research.</p><p>ZK Mesh is produced by <a href="https://www.zkhack.dev/">ZK Hack</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support our work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>We bring you recent research, useful articles, videos, podcasts, tweets, tools, project updates, and events. Expect a new edition every month. Be sure to share and <a href="https://zkmesh.substack.com/">subscribe</a>!</p><h4>Research</h4><ul><li><p><a href="https://eprint.iacr.org/2025/917">Jagged Polynomial Commitments (or: How to Stack Multilinears)</a> | Tamir Hemo, Kevin Jue, Eugene Rabinovich, Gyumin Roh and Ron D. Rothblum</p></li><li><p><a href="https://eprint.iacr.org/2025/954">Poseidon and Neptune: Gr&#246;bner Basis Cryptanalysis Exploiting Subspace Trails</a> | Lorenzo Grassi, Katharina Koschatko and Christian Rechberger</p></li><li><p><a href="https://baincapitalcrypto.com/ligerito-a-small-and-concretely-fast-polynomial-commitment-scheme/">Ligerito: A Small and Concretely Fast Polynomial Commitment Scheme</a> | Andrija Novakovic and Guillermo Angeris</p></li><li><p><a href="https://levs57.github.io/logup_.pdf">Logup*: faster, cheaper logup argument for small-table indexed lookups</a> | Lev Soukhanov</p></li><li><p><a href="https://eprint.iacr.org/2025/937">Attacking Poseidon via Graeffe-Based Root-Finding over NTT-Friendly Fields</a> | Antonio Sanso and Giuseppe Vitto</p></li><li><p><a href="https://eprint.iacr.org/2025/947">Quantum Rewinding for IOP-Based Succinct Arguments</a> | Alessandro Chiesa, Marcel Dall'Agnol, Zijing Di, Ziyi Guan and Nicholas Spooner</p></li><li><p><a href="https://eprint.iacr.org/2025/926">Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues (Full Version)</a> | Jincheol Ha, Seongha Hwang, Jooyoung Lee, Seungmin Park and Mincheol Son</p></li><li><p><a href="https://eprint.iacr.org/2025/921">Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable</a> | Kostas Kryptos Chalkias, Deepak Maram, Arnab Roy, Joy Wang and Aayush Yadav</p></li><li><p><a href="https://eprint.iacr.org/2025/933">Fast elliptic curve scalar multiplications in SN(T)ARK circuits</a> | Liam Eagen, Youssef El Housni, Simon Masson and Thomas Piellard</p></li><li><p><a href="https://eprint.iacr.org/2025/902">On the Fiat&#8211;Shamir Security of Succinct Arguments From Functional Commitments</a> | Alessandro Chiesa, Ziyi Guan, Christian Knabenhans and Zihan Yu</p></li><li><p><a href="https://eprint.iacr.org/2025/776">Clementine: A Collateral-Efficient, Trust-Minimized, and Scalable Bitcoin Bridge</a> | Ekrem Bal, Lukas Aumayr, Atacan &#304;yido&#287;an, Giulia Scaffino, Hakan Karaku&#351;, Cengiz Eray Aslan and Orfeas Stefanos Thyfronitis Litos</p></li><li><p><a href="https://eprint.iacr.org/2025/922">HyperWolf: Efficient Polynomial Commitment Schemes from Lattices</a> | Lizhen Zhang, Shang Gao and Bin Xiao</p></li><li><p><a href="https://eprint.iacr.org/2025/916">Automated Verification of Consistency in Zero-Knowledge Proof Circuits</a> | Jon Stephens, Shankara Pailoor and Isil Dillig</p></li><li><p><a href="https://eprint.iacr.org/2025/813">HydraProofs: Optimally Computing All Proofs In a Vector Commitment (with Applications to Efficient zkSNARKs Over Data From Multiple Users)</a> | Christodoulos Pappas, Dimitris Papadopoulos and Charalampos Papamanthou</p></li><li><p><a href="https://eprint.iacr.org/2025/889.pdf">At the Top of the Hypercube &#8211; Better Size-Time Tradeoffs for Hash-Based Signatures</a> | Dmitry Khovratovich, Mikhail Kudinov and Benedikt Wagner</p></li><li><p><a href="https://eprint.iacr.org/2025/908">SubLogarithmic Linear Time SNARKs from Compressed Sum-Check</a> | Nitin Singh and Sikhar Patranabis</p></li></ul><h4>Articles/Threads</h4><ul><li><p><a href="https://burningbridges.substack.com/p/the-same-thing-that-happened-to-ai">The Same Thing That Happened to AI is Happening to ZK</a> | Conner Swann</p></li><li><p><a href="https://nmohnblatt.github.io/ligerito-and-whir/">Comparing Ligerito and WHIR</a> | Nico Mohnblatt</p></li><li><p><a href="https://x.com/reflexical/status/1924490336816271531">zkTLS companies and use-cases</a> | Reflexical (@reflexical)</p></li><li><p><a href="https://ethresear.ch/t/lattice-based-signature-aggregation/22282">Lattice-Based Signature Aggregation</a> | EthResearch, by David Nevado, Dohoon Kim, and Miha Stopar</p></li><li><p><a href="https://x.com/_weidai/status/1918347586685288483">Google Wallet ZK system update</a> | Wei Dai (@_weidai)</p></li><li><p><a href="https://www.kobi.one/The-Lies-Our-Provers-Tell-Us-1f32d692802180358ae6c14fd9d09127">The Lies Our Provers Tell Us</a> | Kobi Gurkan</p></li><li><p><a href="https://aztec.network/blog/how-to-enable-age-verification-on-the-internet-today-using-zero-knowledge-proofs">How to Enable Age Verification On the Internet Today Using Zero-Knowledge Proofs</a> | Aztec</p></li><li><p><a href="https://x.com/OrestTa/status/1925601835122917535">zk Realtime Proving in the future</a> | Orest Tarasiuk (@OrestTa)</p></li><li><p><a href="https://nmohnblatt.github.io/libzk-highlights/">Highlights of libZK, the Google Wallet ZKP</a> | Nicolas Mohnblatt</p></li></ul><h4>Videos/Podcasts</h4><ul><li><p><a href="https://medium.com/veridise/fireside-chat-with-michael-klein-inside-noir-aztecs-zk-language-security-and-tools-explained-4624168b6530?source=rss-d54583b14487------2">Fireside Chat With Michael Klein: Inside Noir &#8212; Aztec&#8217;s ZK Language, Security and Tools Explained</a> | Veridise</p></li><li><p><a href="https://zeroknowledge.fm/podcast/361/">Implementing LatticeFold with Matthew and Albert from Nethermind</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://zeroknowledge.fm/podcast/359/">Lattice-based ZK Systems with Vadim Lyubashevsky</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://www.youtube.com/playlist?list=PLj80z0cJm8QFy2umHqu77a8dbZSqpSH54">zkSummit 13 Toronto Recordings Playlist</a> | Zero Knowledge Podcast</p></li><li><p><a href="https://soundcloud.com/conner-swann-243997879/prover-killers">Prover Killers Rap</a> | Conner Swann</p></li><li><p><a href="https://www.youtube.com/watch?v=7qUTlZCvgKA">We need to have programmable privacy</a> | ZkCloud</p></li><li><p><a href="https://www.youtube.com/watch?v=f5AvMBUV4WY">Ethproofs Call #2: Real-time proving</a> | Ethereum</p></li><li><p><a href="https://x.com/Ingo_zk/status/1928014896194801752">Miden Blockchain: Edge-first, ZK-native</a> | Snark Chocolate</p></li></ul><h4>Guides and Resources</h4><ul><li><p><a href="https://github.com/explainers-by-googlers/private-proof">Private Proof API</a> | explainers-by-googlers</p></li><li><p><a href="https://realtime.succinct.xyz/">Real-Time Ethereum Proving</a> | Succinct</p></li><li><p><a href="https://blog.zksecurity.xyz/posts/kzg-1/">Variants of KZG: Part I, Univariate</a> | zkSecurity</p></li><li><p><a href="https://mirror.xyz/0x90699B5A52BccbdFe73d5c9F3d039a33fb2D1AF6/p4SxosKTbrdxhociK-vNCk_K9EMpa-hpke-YKtpZ49A">R1CS Vs Plonk: Zero Constraint Linearities</a> | Rarimo</p></li><li><p><a href="https://pse.dev/en/blog/tee-based-ppd">TEE based private proof delegation</a> | PSE</p></li></ul><h4>Tools/Implementations</h4><ul><li><p><a href="https://eprint.iacr.org/2025/534">Plonkify: R1CS-to-Plonk transpiler</a> | Pengfei Zhu</p></li><li><p><a href="https://x.com/dr_zircuit/status/1918642455810871315?s=46&amp;t=ckKu9J9v0ruNKfYnUq_-t">Physical objects as private keys</a> | Dr. Z (@dr_zircuit)</p></li><li><p><a href="https://github.com/SamuelSchlesinger/anonymous-credit-tokens/blob/main/docs/design.pdf">Anonymous Credit Tokens</a> | Jonathan Katz and Samuel Schlesinger</p></li><li><p><a href="https://github.com/argumentcomputer/ix">Ix: a zero-knowledge proof-carrying code platform</a> | Argument</p></li><li><p><a href="https://pse.dev/en/blog/mopro-native-packages">Integrating Mopro Native Packages Across Mobile Platforms</a> | PSE</p></li></ul><h4>Vulnerabilities</h4><ul><li><p><a href="https://solana.com/news/post-mortem-may-2-2025">Post Mortem: ZK ElGamal Proof Program Bug</a> | Solana Foundation</p></li><li><p><a href="https://thequantuminsider.com/2025/05/24/google-researcher-lowers-quantum-bar-to-crack-rsa-encryption/">Google Researcher Lowers Quantum Bar to Crack RSA Encryption</a> | Matt Swayne</p></li></ul><h4>Project Updates</h4><ul><li><p><a href="https://blog.google/products/google-pay/google-wallet-age-identity-verifications/">It&#8217;s now easier to prove age and identity with Google Wallet</a> | Google</p></li><li><p><a href="https://aztec.network/blog/a-new-era-for-web3-introducing-aztec-public-testnet">A New Era for Web3: Introducing Aztec Public Testnet</a> | Aztec</p></li><li><p><a href="https://medium.com/@ingonyama/zerobase-x-icicle-accelerating-real-time-zk-applications-at-scale-b0b9451b4172?source=rss-c8015c09c44------2">ZEROBASE X ICICLE: Accelerating Real-Time ZK Applications at Scale</a> | Ingonyama</p></li><li><p><a href="https://blog.lambdaclass.com/lambdas-new-strategic-partnership-with-miden-the-edge-blockchain/">Lambda's New Strategic Partnership With Miden: The Edge Blockchain</a> | Lambda Class</p></li><li><p><a href="https://starkware.co/blog/s-two-prover/">S-two Prover</a> | Starkware</p></li><li><p><a href="https://arxiv.org/abs/2505.08114">Valida ISA Spec, version 1.0: A zk-Optimized Instruction Set Architecture</a> | Lita</p></li><li><p><a href="https://blog.succinct.xyz/sp1-hypercube/">SP1 Hypercube: Proving Ethereum In Real-Time</a> | Succinct</p></li><li><p><a href="https://blog.succinct.xyz/bitcoin-sp1/">SP1 Is Bitcoin Ready: The Era of ZK On Bitcoin Has Begun</a> | Succinct</p></li><li><p><a href="https://www.vlayer.xyz/blog/vlayer-launches-mainnet-the-next-step-in-making-smart-contracts-useful-for-billions">vlayer Launches Mainnet: The Next Step in Making Smart Contracts Useful for Billions</a> | vlayer</p></li><li><p><a href="https://medium.com/veridise/verifying-sp1-circuit-determinism-with-picus-a-collaboration-between-veridise-and-succinct-985c7a6dd9b5?source=rss-d54583b14487------2">Verifying SP1 Circuit Determinism With Picus: A Collaboration Between Veridise and Succinct</a> | Veridise</p></li><li><p><a href="https://www.powdr.org/blog/powdr-openvm-autoprecompiles">powdr-OpenVM: End-to-End Autoprecompiles</a> | powdr</p></li><li><p><a href="https://mirror.xyz/0x90699B5A52BccbdFe73d5c9F3d039a33fb2D1AF6/6o3BgQoMxuvZbLOVoURyzShM4s7_Z6AZYlB_uGSbKvc">Bionetta: Ultimate Client-Side ZKML. Technical Overview</a> | Rarimo</p></li><li><p><a href="https://x.com/IrreducibleHW/status/1920833298512674898">PetraVM, a Binius-based verifiable VM</a> | Irreducible and Polygon</p></li><li><p><a href="https://x.com/fermah_xyz/status/1919800456479482179">Confidential Proving Delegation</a> | Fermah</p></li><li><p><a href="https://www.ingonyama.com/post/introducing-icicle-stwo-a-gpu-accelerated-stwo-prover">Introducing ICICLE-Stwo: A GPU-Accelerated Stwo Prover</a> | Ingonyama</p></li><li><p><a href="https://beboundless.xyz/blog/boundless-architecture-design">The Architecture Behind Boundless</a> | Boundless</p></li></ul><h4>Events/Hackathons</h4><ul><li><p><a href="https://lu.ma/wero3jvo">W3PN_Hacks</a> | Berlin, Germany. June 13, 2025</p></li><li><p><a href="https://dappcon.io/">DappCon 25</a> | Berlin, Germany. June 16 - 18, 2025</p></li><li><p><a href="https://zuberlin.city/">ZuBerlin 2025</a> | Berlin, Germany. June 14-22, 2025</p></li><li><p><em><strong><a href="https://zkberlin.com/">ZK Hack Berlin hackathon</a> | Berlin, Germany. June 20 - 22, 2025</strong></em></p></li><li><p><a href="https://ethcc.io/">ETHCC</a> | Cannes, France. June 30 - July 3, 2025</p></li></ul><p>&#8212;&#8212;&#8212;&#8212;</p><p>There you have it! Hope you liked this edition of ZK Mesh. Be sure to <a href="https://zkmesh.substack.com/">subscribe</a> to get the next edition in your inbox.</p><p>Lastly, if you have something you think should be included in the next edition or suggestions for the format, tweet at us <a href="https://twitter.com/__zkhack__">@__zkhack__</a>!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://zkmesh.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading ZK Mesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>