Skip to content

Cryptography

March 10, 2026
January 21, 2016

back in my days, crypto does not mean blockchain#Cryptocurrency

enigma-machine
crypto-shangmi
crypto-pqc
crypto-pkcs

A Crash Course in Everything Cryptographic – Noteworthy - The Journal Blog ❗!important
Survival Guide - Encryption, Authentication, Digests, MAC and Signatures ❗!important
The Genius Math of Modern Encryption - YouTube

Category:Theory of cryptography - Wikipedia

Crypto Forum (cfrg) ❗!important, IETF
Limited Additional Mechanisms for PKIX and SMIME (lamps) ❗!important, IETF
Cryptology ePrint Archive ❗!important
Welcome | Practical Cryptography for Developers
nakov/Practical-Cryptography-for-Developers-Book: Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Cryptography 101 with Alfred Menezes – Video lectures, notes, and exercises in all areas of applied cryptography
Cryptography 101 - YouTube

The International Association for Cryptologic Research
IACR - YouTube

科普园地_国家密码管理局
密码学报 中国密码学会
中国密码学会 - 密评工作

Course
Cryptography | Computer science theory | Computing | Khan Academy
Cryptography I | Coursera
The Cryptopals Crypto Challenges
The Joy of Cryptography ❗!important, course
A Graduate Course in Applied Cryptography ❗!important, course
Crypto 101
ECE407/CS407: Cryptography
7 Cryptography Concepts EVERY Developer Should Know - YouTube
Secret Codes: A History of Cryptography (Part 1) - YouTube
More Secret Codes: A History of Cryptography (Part 2) - YouTube

An Overview of Cryptography

In cryptography, these entities are usually used:

Education Center | Explore Now | Encryption Consulting

Classical Cryptography

Classical Cryptography - YouTube

The Unbreakable Kryptos Code - YouTube Vigenère cipher, substitution Cipher

Benchmarks

eBACS: ECRYPT Benchmarking of Cryptographic Systems
PQ Code Package Benchmarks

Symmetric Cryptography

Symmetric-key algorithm - Wikiwand
密码学学习笔记04对称加密 - 知乎

Block Ciphers

contrast "stream ciphers", where encrypted strings are the same length as the plaintext

Lecture3 Lecture 3: Block Ciphers and the Data Encryption Standard

Anatomy of a password disaster – Adobe’s giant-sized cryptographic blunder – Naked Security study of Adobe's leaked password database

Feistel Cipher - Computerphile - YouTube

Modes of operation

Block cipher mode of operation - Wikiwand

Block ciphers, as the name suggests, encrypts blocks. The methods of segmenting data into blocks is called "modes of operation".

The Third NIST Workshop on Block Cipher Modes of Operation 2023 | CSRC

Modes of Operation - Computerphile - YouTube
ECB: simply divides a message into 16 byte blocks, preserves pattern (for experts only: ECB should never be used except in some very specific cases)
CBC: first block XORed with Initialization Vector (IV) (nonce), every other block XORed with the ciphertext of the block preceding it; however this introduces dependency on previous block and encryption cannot be parallelized
CTR: uses counter and nonce (similar to IV) per block to allow each block to be encrypted concurrently

CBC mode is suspectable to Padding oracle attack (Vaudenay Attack)
Moxie Marlinspike >> Blog >> The Cryptographic Doom Principle
Always Encrypt-then-MAC, so that verifying the MAC does not involve decryption

Counter mode transforms a block cipher into a stream cipher.

Authenticated encryption - Wikiwand GCM, CCM, protects against chosen ciphertext attack on decryption oracle
Authenticated Encryption in .NET with AES-GCM

DES

Even Triple DES (3-DES) is not recommended

Data Encryption Standard - Wikiwand
【计算机博物志】DES的生与死 - YouTube

AES

Advanced Encryption Standard - Wikiwand
Lecture 8: AES: The Advanced Encryption Standard
Protect your TCP tunnel by implementing AES encryption with Python [Tutorial] | Packt Hub

Crypto competitions: AES: the Advanced Encryption Standard
AES Explained (Advanced Encryption Standard) - Computerphile - YouTube
AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile - YouTube
One Encryption Standard to Rule Them All! - Computerphile - YouTube
Almost All Web Encryption Works Like This (SP Networks) - Computerphile - YouTube
AES: How to Design Secure Encryption - YouTube

CTR mode, also known as Counter mode, is a stream cipher mode of AES encryption. With stream cipher encryption, it is not necessary to encrypt the plaintext in fixed blocks like AES in CBC mode, which encrypts data in 16-byte blocks. If the plaintext to be encrypted is smaller than the block size, padding is required to process a complete 16-byte block.

ARIA

ARIA (cipher) - Wikiwand

RFC 5794 - A Description of the ARIA Encryption Algorithm

AES-256 vs ARIA-256 | Popular Encryption Standards Comparison

Commands

opessl openssl is for proof of concept

man enc  # show ciphers

# encryption
openssl aes-256-cbc -in attack-plan.txt -out message.enc

# decryption
openssl aes-256-cbc -d -in message.enc -out plain-text.txt

# speed comparison
openssl speed -aes-256-cbc -aria-256-cbc

gpg

# encryption
gpg --cipher-algo AES256 --symmetric filename.tar.gz

# decryption
gpg --output filename.tar.gz --decrypt filename.tar.gz.gpg

AES Crypt
aescrypt

Stream Ciphers

Chacha Cipher

alternative to AES

Chacha Cipher - Computerphile - YouTube
RFC 8439 - ChaCha20 and Poly1305 for IETF Protocols
ARX cipher: add, rotate, xor

The design of Chacha20 encryption
The design of Poly1305 MAC

Asymmetric Cryptography

Public-key cryptography - Wikiwand
Asymmetric Encryption: An Introduction To Asymmetric Cryptography
Public Key crypto simply works with numbers. This means that any messages would have to be converted into a number before being encrypted.

There are generally three things asymmetric algorithms can do:

However, not all algorithms can perform all functions:

密码学学习笔记05公钥密码系统 - 知乎

Backdoors in Asymmetric Cryptography

Why I don’t Trust NIST P-256 | Credelius
How to manipulate curve standards: a white paper for the black hat

How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer

NIST's P-256, P-384, P-521 curves are distrusted
Curve25519, Curve448 are used by the community

RSA

crypto-rsa-example

RSA (cryptosystem) - Wikiwand
How does RSA work? – Hacker Noon

PKCS 1 - Wikiwand
RFC 8017 - PKCS #1: RSA Cryptography Specifications Version 2.2

RSA Signing is Not RSA Decryption optimal asymmetric encryption padding (OAEP) is used for pre/post-processing before RSA

Prime Numbers & RSA Encryption Algorithm - Computerphile - YouTube
Breaking RSA - Computerphile - YouTube
The RSA Encryption Algorithm (1 of 2: Computing an Example) - YouTube
The RSA Encryption Algorithm (2 of 2: Generating the Keys) - YouTube
How prime numbers protect your privacy #SoME2 - YouTube

Pretty Good Privacy (PGP) and Digital Signatures | Linux Journal

Passive SSH Key Compromise via Lattices | Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security

Elliptic Curve Cryptography (ECC)

ANSI X9.62-2005_317.pdf The Elliptic Curve Digital Signature Algorithm
FIPS 186-5, Digital Signature Standard (DSS) | CSRC P-192, P-256, P-384 curves
RFC 5639 - Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation avoid potential patent issues associated other ECC curves

RFC 6979 - Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)
RFC 6605 - Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC
A (Relatively Easy To Understand) Primer on Elliptic Curve Cryptography
Elliptic Curve Cryptography: a gentle introduction - Andrea Corbellini
how does ECDSA works - Phind
Paul Miller — Learning fast elliptic-curve cryptography
ECDSA: Elliptic Curve Signatures | Practical Cryptography for Developers
EdDSA and Ed25519 | Practical Cryptography for Developers
Elliptic Curves over Finite Fields | By RareSkills – RareSkills basic ZKP

RFC 8032 - Edwards-Curve Digital Signature Algorithm (EdDSA)
EdDSA Keys and Signatures

Ed25519: high-speed high-security signatures highly efficient algo with strengh similar to RSA with ~3000-bit keys
A Deep dive into Ed25519 Signatures

ECDSA vs EdDSA - Sefik Ilkin Serengil EdDSA is more effient and secure than ECDSA
cryptography - SSH Key: Ed25519 vs RSA - Information Security Stack Exchange

age

FiloSottile/age: A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.

Ciphertext indistinguishability

Ciphertext indistinguishability - Wikiwand
Chosen-plaintext attack - Wikiwand
Chosen-ciphertext attack - Wikiwand CCA
Adaptive chosen-ciphertext attack - Wikiwand

These are useful for proving the protocol is Universal Composable.
Universal composability - Wikipedia
Universally Composable Security: A New Paradigm for Cryptographic Protocols
encryption - What is universal composability guaranteeing, specifically? Where does it apply, and where does it not? - Cryptography Stack Exchange

Algorithms

Bit security measures the number of trials required to brute-force a key. 128 bit security means 2128 trials to break.

Cryptographic nonce - Wikiwand
Comparison of cryptography libraries - Wikiwand

Computer and Network Security by Avi Kak

Hashing/Key Derivation Function

Key derivation function - Wikiwand
HKDF - Wikiwand HMAC (keyed cryptographic hash functions) are candidates KDF
Cryptographic Extraction and Key Derivation: The HKDF Scheme

KEM Combiners secure pseudorandom function (PRF)
X-Wing IND-CCA KEM
On Robust Combiners for Oblivious Transfer and Other Primitives | SpringerLink
draft-irtf-cfrg-hybrid-kems-03 - Hybrid PQ/T Key Encapsulation Mechanisms hybrid KEM schemes, security considerations

Secure Hash Algorithms - Wikiwand SHA
SHA: Secure Hashing Algorithm - Computerphile - YouTube

SHA-1 - Wikiwand
FIPS 180-1, Secure Hash Standard | CSRC

SHA-2 - Wikiwand
FIPS 180-4, Secure Hash Standard (SHS) | CSRC
SHA2 Fatal Flaw? (Hash Length Extension Attack) - Computerphile - YouTube
Coding a SHA2 Length Extension Attack - Computerphile - YouTube

SHA-3 - Wikiwand Kaccak, SHAKE
FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions | CSRC
SHAKE (Sponge Function) allows for hashing arbitrary length input and generating arbitrary length output
SHA-3, Keccak and SHAKE (Sponge Function) - YouTube

RFC 6194 - Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms 💀 deprecated
RFC 6234 - US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) SHA-2
RFC 5869 - HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
RFC 7693 - The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)
RFC 4418 - UMAC: Message Authentication Code using Universal Hashing UHASH is very efficient on 32-bits CPU (embedded systems)

SP 800-56C Rev. 2, Recommendation for Key-Derivation Methods in Key-Establishment Schemes | CSRC
SP 800-108 Rev. 1, Recommendation for Key Derivation Using Pseudorandom Functions | CSRC
SP 800-227, Recommendations for Key-Encapsulation Mechanisms | CSRC

Key derivation function - Wikiwand
Key Derivation Functions vs. Password Hashing Schemes - Cryptography Stack Exchange
encryption - What is the difference between Key Derivation Function and (salted) Hash? - Information Security Stack Exchange

Storing password/Password hashing

the (password) hashing function should be relatively expensive to calculate in case of brute-force attacks
it takes a password, a salt, and a cost factor as inputs then generate a password hash for storage

How To Safely Store A Password | codahale.com bcrypt
Secure Salted Password Hashing - How to do it Properly
The difference between Encryption, Hashing and Salting
Best practices for password hashing and storage - draft-ietf-kitten-password-storage expired 2022-03-31
Serious Security: How to store your users’ passwords safely – Naked Security
How Dropbox securely stores your passwords | Dropbox Tech Blog
Salt (cryptography) - Wikiwand

cryptography - Do any security experts recommend bcrypt for password storage? - Information Security Stack Exchange
BCrypt Explained - DEV Community 👩‍💻👨‍💻

scrypt - Wikiwand
RFC 7914 - The scrypt Password-Based Key Derivation Function

bcrypt - Wikiwand
Bcrypt, a Popular Password Hashing Algorithm, Starts Its Long Goodbye | WIRED

PBKDF2 - Wikiwand
PBKDF2 Hashing Algorithm. Before moving into the PBKDF2 hashing… | by Nishothan Vettivel | Medium
PBKDF2 and Encrypting Data. What keeps your wireless access point… | by Prof Bill Buchanan OBE FRSE | Jan, 2025 | Medium
RFC 2898 - PKCS #5: Password-Based Cryptography Specification Version 2.0

lukeed/salteen: A snappy and lightweight (259B) utility to encrypt and decrypt values with salt.

multiformats/multihash: Self describing hashes - for future proofing

Argon2 - Wikiwand
P-H-C/phc-winner-argon2: The password hash Argon2, winner of PHC
How to enable Argon2 KDF in Bitwarden - gHacks Tech News

Authenticity

Hash vs. Message Authentication Code | Baeldung on Computer Science

MAC ~= hashing with shared key
less prune to replay attack

Message authentication code - Wikiwand MAC
Hash-based message authentication code - Wikiwand HMAC, hash with secret key
Moxie Marlinspike >> Blog >> The Cryptographic Doom Principle Encrypt-then-MAC
Mandatory Access Control

HMAC - Wikiwand
Securing Stream Ciphers (HMAC) - Computerphile - YouTube
RFC 2104 - HMAC: Keyed-Hashing for Message Authentication

If both encryption and authentication are required, consider authenticated encryption and authenticated encryption with associated data (AEAD), such as AES-GCM.

draft-irtf-cfrg-aead-limits-10 - Usage Limits on AEAD Algorithms

Digital Signatures: encrypt a known data (nonce or message hash) with sender's private key
Certificate Authorities: a trusted third party that will digitally sign and publish the public key bound to a user or entity

Implementation

Most TLS library provides crypto layer
openssl
openssl#Alternate Implementations

openssl

The Linux Crypto API for user applications
This is slower than OpenSSL

Welcome to pyca/cryptography — Cryptography documentation
pyca/cryptography: cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.

NaCl
Introduction | libsodium
jedisct1/libsodium: A modern, portable, easy to use crypto library.

PyNaCl: Python binding to the libsodium library — PyNaCl documentation
pyca/pynacl: Python binding to the Networking and Cryptography (NaCl) library

cryptlib Encryption Toolkit
cryptlib/cryptlib: cryptlib security toolkit

Welcome to PyCryptodome’s documentation pycryptodome provides Crypto package (to replace PyCrypto), pycryptodomex provides Cryptodome package
Legrandin/pycryptodome: A self-contained cryptographic library for Python

AES instruction set - Wikiwand

Key Exchange

Key Exchange Problems - Computerphile - YouTube
RFC 9142 - Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)

End to End Encryption (E2EE) - Computerphile - YouTube
How Signal Instant Messaging Protocol Works (& WhatsApp etc) - Computerphile - YouTube

SP 800-56A Rev. 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography | CSRC
SP 800-56B Rev. 2, Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography | CSRC

Non-Interactive Key Exchange (NIKE)

no challenges are presented to be validated
Random oracle - Wikiwand

Understanding Non-Interactive Key Exchange in Cryptography !🔐🌐 | by Samuel Guxegdsa | Medium only sends a single, asynchronous message from each party
Non-Interactive Key Exchange | SpringerLink
Non-Interactive Key Exchange
Cryptographic algorithms as interactive and non-interactive proofs | by Filza | Xord | Medium

Diffie–Hellman key exchange

Diffie–Hellman key exchange - Wikiwand
Elliptic-curve Diffie–Hellman - Wikiwand
Implementation of Diffie-Hellman Algorithm - GeeksforGeeks

Traditional DH:

ECDH:

PKCS #3: Diffie-Hellman Key-Agreement Standard
Intro to PKCS #3: Diffie-Hellman Key Agreement Standard – wolfSSL

RFC 2631 - Diffie-Hellman Key Agreement Method
RFC 7919 - Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)
RFC 8422 - Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier

Secret Key Exchange (Diffie-Hellman) - Computerphile - YouTube
Diffie Hellman -the Mathematics bit- Computerphile - YouTube
Diffie-Hellman Key Exchange: How to Share a Secret - YouTube

Double Ratchet Messaging Encryption - Computerphile - YouTube Extended Triple Diffie–Hellman (X3DH)
Signal >> Specifications >> The X3DH Key Agreement Protocol

Signal's protocol, requires identity key
Post-Quantum Extended Diffie–Hellman - Wikiwand
Cryspen | An Analysis of Signal's PQXDH

[2501.09568] Quantum Diffie-Hellman key exchange Quantum system

Internet Key Exchange (IKE)

used by many technologies that are protected by IPsec, e.g. VPN, SFTP, SSH and Point-to-Point Protocol (PPP).

IPsec - Wikiwand
Internet Key Exchange - Wikiwand
What is Internet Key Exchange (IKE) and How Does It Work? | Definition from TechTarget
what is Internet Key Exchange Protocol Version 2 (IKEv2)? - Phind

RFC 4306 - Internet Key Exchange (IKEv2) Protocol
RFC 4754 - IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
RFC 8784 - Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security
RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) allow large-sized keys
RFC 9370 - Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2) allows multiple rounds of key exchanges
Internet Key Exchange Version 2 (IKEv2) Parameters

SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols | SpringerLink

Attribute-Based Encryption

A Gentle Introduction to Attribute-Based Encryption

Signature

What are Digital Signatures? - Computerphile - YouTube

RSA and Digital Signatures - GeeksforGeeks
Digital Signature Algorithm (DSA) - GeeksforGeeks
Blockchain - Elliptic Curve Digital Signature Algorithm (ECDSA) - GeeksforGeeks

Complexity of ECDSA is not deterministic

#RSA
#Elliptic Curve Cryptography (ECC)

BLS

BLS digital signature - Wikiwand
BLS Signature for Busy People
Crypto Pills #11: BLS Signatures. BLS (Boneh–Lynn–Shacham) signatures… | by Guilherme Balena Versiani | Medium

Steganography

Steganography - Wikiwand
隐写术鉴赏 - YouTube

Outguess – Rbcafe
OutGuess - Wikiwand
resurrecting-open-source-projects/outguess: Universal steganographic tool

StegCloak
KuroLabs/stegcloak: Hide secrets with invisible characters in plain text securely using passwords 🧙🏻‍♂️⭐
How to Hide Secrets in Strings— Modern Text hiding in JavaScript | by Mohan Sundar | Bits and Pieces

resurrecting-open-source-projects/outguess: Universal steganographic tool

Homomorphic Encryption

ciphertext that can be processed or analyzed

Homomorphic encryption - Wikiwand
Fully Homomorphic Encryption | We are a community of researchers and developers interested in advancing homomorphic encryption and other secure computation techniques.

Fully Homomorphic Encryption | Resources ❗!important
[2503.05136] The Beginner's Textbook for Fully Homomorphic Encryption
The Beginner’s Textbook for Fully Homomorphic Encryption online version

Homomorphic Encryption: How It Works | Splunk
What Is Homomorphic Encryption?

3 Homomorphic Encryption Trends for 2025

How a 7-Year-Old Can Understand FHE / Fully Homomorphic Encryption | by Nothing Research | Medium
Advanced FHE Protocols for the Blockchain (RWC 2024) - YouTube

Homomorphic Encryption vs Zero Knowledge

Fully Homomorphic Encryption and Zero Knowledge: Data security secrets | by Illy’s Web3 blog | Medium
FHE Vs ZK Vs MPC, what are the differences between the three encryption technologies? | Odaily星球日报 on Binance Square

Privacy

see crypto#Zero-knowledge proof/ZKP

Privacy-Preserving Data Science, Explained – OpenMined

crypt.fyi - Open-Source Zero-Knowledge Post-Quantum End-to-End Encrypted One-Time Secret Sharing
Zero-Knowledge sharing

Lattice-based_Zero-knowledge_Proofs_for_Blockchain_Confidential_Transactions.pdf

Zero-knowledge proof/ZKP

Zero-knowledge proof - Wikiwand
把問題和答案的關聯轉變成機率問題, 透過趨近無窮次的試驗,使猜對的機率趨近 0
Non-interactive zero-knowledge proof - Wikiwand

Introduction | ZKDocs
trailofbits/zkdocs: Interactive documentation on zero-knowledge proof systems and related primitives.

Zero-Knowledge Proofs: A Beginner's Guide
Zero Knowledge Proofs: An illustrated primer – A Few Thoughts on Cryptographic Engineering
Zero-knowledge proofs explained in 3 examples
What are Zero Knowledge Proofs? – OpenMined
Zero-knowledge Proof: IZKs, NIZKs, SNARKS, STARKS Explained. | by Mayowa Olatunji (@web3MIO) | Coinmonks | Medium

I can prove I’ve solved this Sudoku without revealing it - YouTube
Zero Knowledge Proofs: A Technical Deep Dive - YouTube
Zero Knowledge Proofs - YouTube
神奇的零知识证明!既能保守秘密,又让别人信你! - YouTube

The Magic of Zero-Knowledge Proofs #SoME3 - YouTube

Full Guide to Understanding zk-SNARKs and zk-STARKS

Leveraging Verifiable Credentials and Zero Knowledge Proofs with Sindri GSP1302 - YouTube
Zero Knowledge Selective Disclosure (ZK-SD-VCs) | IOTA Documentation
General-Purpose Zero-Knowledge Proofs for Verifiable Credentials PDF
rwot9-prague/topics-and-advance-readings/verifiable-credentials-and-zero-knowledge-proof-systems.md at master · WebOfTrustInfo/rwot9-prague

LeastAuthority/moonmath-manual: A resource for anyone interested in understanding and unlocking the potential of zk-SNARKs, from beginners to experts.
ZK Math Explained: Homomorphisms
ZK Math Explained: Understanding Elliptic Curves
ZK Math Explained: The Elliptic Curve Discrete Logarithm Problem

ZPK uses different signatures
draft-irtf-cfrg-bbs-signatures - The BBS Signature Scheme
decentralized-identity/bbs-signature: The BBS Signature Scheme
Short Randomizable Signatures "PS" signature
Zhiyi-Zhang/PS-Signature-and-EL-PASSO: A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)
Practical Post-Quantum Signatures for Privacy
Signatures with efficient protocols Camenisch-Lysyanskaya signature (CL signature), obsolete, signature size linear to message size

LaZer: a Lattice Library for Zero-Knowledge and Succinct Proofs (RWC 2024) - YouTube
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity... (RWC 2024) - YouTube

Zero-Knowledge Proofs: How it Works & Use Cases in 2026
Zero-Knowledge Proof (ZKP) — Explained | Chainlink
Zero-Knowledge Proof: Applications & Use Cases - Chainlink
(PDF) Zero-knowledge proof framework for privacy-preserving financial compliance

zkVMs

The different types of ZK-EVMs

The Evolution of Rust inside zkVMs - Erik Kadena | RISC Zero - YouTube
Zeroing into zkVMs — Taiko Labs