Browse all Security articles.

18 min read
Succinct proofs of a vector commitment If we have a Pedersen vector commitment $A$ which contains a commitment to a vector $\mathbf{a}$ as $A = a_1G_1 + a_2G_2+\dots + a_nG_n$ we can prove we know...
Last updated on Jan 31, 2026
18 min read
Elliptic Curves over Finite Fields What do elliptic curves in finite fields look like? It’s easy to visualize smooth elliptic curves, but what do elliptic curves over a finite field look like? The...
Last updated on Dec 17, 2025
9 min read
The Solana Token 2022 Specification Token-2022 is a new backward-compatible version of the SPL Token program that supports additional features in the form of extensions. The bytecode for these...
Last updated on Oct 17, 2025
6 min read
ZK Friendly Hash Functions ZK-friendly hash functions are hash functions that require much fewer constraints to prove and verify than traditional cryptographic hash functions. Hash functions such as...
Last updated on Aug 20, 2025
Reducing the number of equality checks (constraints) through random linear combinations Random linear combinations are a common trick in zero knowledge proof algorithms to enable $m$ equality checks...
Last updated on Nov 13, 2024
PDA (Program Derived Address) vs Keypair Account in Solana !Hero image showing PDA (Program Derived Address v.s. Keypair accounts) A program derived address (PDA) is an account whose address is...
Last updated on Sep 5, 2024