- Pablo Deymonnaz
- Diego Kingston
- Federico Carrone
The ZK proving systems landscape has exploded. Circle STARKs (Starkware/Stwo) operate over the Mersenne31 field, enabling dramatically faster proof generation by exploiting the structure of circles over finite fields. Binius (Irreducible) works over binary tower fields, achieving the smallest proofs for binary circuits. Jolt/Lasso (a16z) use lookup arguments to verify RISC-V execution without custom circuits -- this is the "lookup singularity" approach where the prover just commits to a trace and proves lookups into predefined tables. Folding schemes (Nova, HyperNova, SuperNova from Microsoft Research) are the other major paradigm shift: instead of proving a computation all at once, you incrementally fold instances together, enabling IVC (Incremental Verifiable Computation) for long-running computations like blockchain state transitions.
Post-quantum cryptography has moved from research to deployment: NIST finalized FIPS 203 (ML-KEM, lattice-based key encapsulation), FIPS 204 (ML-DSA, lattice-based signatures), and FIPS 205 (SLH-DSA, hash-based signatures). Chrome and Signal already ship post-quantum key exchange. The FHE entries (Zama's fhEVM, Concrete ML) show fully homomorphic encryption becoming practical for specific use cases -- encrypted on-chain computation and private ML inference -- though it remains orders of magnitude slower than plaintext for general computation.
- 1. Foundations of Cryptography
- 2. Symmetric encryption
- 3. Asymmetric encryption
- 4. Hash Functions, MAC and Signatures
- 5. What is Money?
- 6. Introduction to blockchains and cryptocurrencies
- 7. Bitcoin
- 8. Ethereum
- 9. Wallets, Dapps and DeFi
- 10. Oracles, Bridges and Rollups
- 11. EVM
- 12. Security
- 13. MEV
- 14. Zcash, SNARKs and Privacy in blockchains
- 15. Scaling blockchains
- 16. Tendermint, HotStuff and Narwhal
- 17. Bitcoin: SegWit, Taproot, Lightning Network and Covenants
- Books
- Courses
- Missing topics
- Groups, Rings and Fields
- Finite Fields
- Modular Arithmetic
- Polynomials over a Field
- P versus NP problem
- Computationally Hard Problems: Factorization and the Discrete Logarithm
- Elliptic Curves
- Elliptic Curves Pairings and Field Extensions
- Chapter entitled Cryptography: Sections on Symmetric Crypto Primitives - Anderson Security Engineering - Overview of symmetric primitives including block ciphers, stream ciphers, and their real-world failure modes
- A (Relatively Easy To Understand) Primer on Elliptic Curve Cryptography - Nick Sullivan - Gentle introduction to why elliptic curves are used in crypto and how ECDH and ECDSA work
- Exploring Elliptic Curve Pairings - Vitalik Buterin - Explains bilinear pairings on elliptic curves, the mathematical foundation behind BLS signatures and zk-SNARKs
- Pairing - Short walkthrough of how pairing-based cryptography enables the Pinocchio zk-SNARK protocol
- Ben Lynn's notes on cryptography, abstract algebra and number theory - Concise Stanford lecture notes covering groups, fields, pairings, and their applications in cryptographic protocols
- Reed Solomon - Hands-on explanation of Reed-Solomon error-correcting codes with code examples
- Reed-Solomon codes for coders - Step-by-step tutorial on implementing Reed-Solomon encoding and decoding from scratch
- Moonmath - Comprehensive manual covering the mathematics behind zk-SNARKs, from finite fields through polynomial commitments
- Programming Bitcoin: Learn How to Program Bitcoin from Scratch - Jimmy Song - Hands-on exercises building a Bitcoin library in Python, covering elliptic curves, transactions, and script
- Stream ciphers and block ciphers
- AES
- AES operation modes
- ChaCha20
- Security definitions.
- Attacks on block and stream ciphers.
- Diffie-Hellman Key Exchange
- ECDH
- ElGamal
- RSA
- PKCS
- Twenty Years of Attacks on the RSA Cryptosystem - Dan Boneh - Survey of two decades of RSA attacks including timing attacks, padding oracles, and small-exponent vulnerabilities
- Properties of cryptographic hash functions
- Merkle-Damgard construction
- MD5
- SHA1
- Sponge constructions
- Keccak - SHA3
- Message Authentication Codes
- ECDSA signature
- Schnor signature
- BLS signature
- What is a Cryptographic Hash Function? - Alin Tomescu - Explains collision resistance, preimage resistance, and why hash functions are fundamental to blockchains
- What is the BLS signature scheme? - David Wong - Introduction to BLS signatures and why their aggregation property makes them ideal for consensus protocols
- BLS Signatures - Remco Bloemen - Technical deep dive into BLS signature math, aggregation, and their use in Ethereum 2.0 validator attestations
- A Brief History of Money - Traces the evolution of money from barter through gold, fiat, and digital currencies
- Shelling Out: The Origins of Money - Nick Szabo - Argues that collectibles and proto-money emerged from evolutionary pressures to solve cooperation problems
- What is Money anyway - Lyn Alden - Comprehensive analysis of money as a ledger technology, comparing hard money, credit money, and digital alternatives
- Money in the modern economy: an introduction - Bank of England primer on what money is and the different types of money in a modern economy
- Money creation in the modern economy - Bank of England explains how commercial banks create money through lending, debunking the money multiplier myth
- The Cypherpunks - History of the cypherpunk movement and how their ideas about privacy and digital cash led to Bitcoin
- What is a blockchain?
- State Machines
- Consensus
- Merkle Trees
- Why cryptocurrencies are interesting? - Motivates why permissionless digital money and programmable contracts matter beyond speculation
- Cancelled Nickel Trades on the LME - Video showing how the London Metal Exchange reversed trades to bail out insiders, illustrating why immutable ledgers matter
- What is a Blockchain - Ittai Abraham - Formal definition of a blockchain as a replicated state machine with safety and liveness properties
- How does everything tie together? - Connects the building blocks of blockchains: cryptography, consensus, state machines, and incentives
- Blockchains as Cryptographic Data Structures - Pramod Viswanath - Lecture notes formalizing blockchains as authenticated data structures using hash chains and Merkle trees
- Hash functions - Explains how cryptographic hash functions provide data integrity and proof-of-work in blockchains
- Merkle Tree - Introduces Merkle trees and how they enable efficient verification of data in blocks
- What is a Merkle Tree - Formal treatment of Merkle trees covering proofs of inclusion, exclusion, and their role in light clients
- What is Consensus? - Kartik Nayak, Ittai Abraham - Rigorous definition of consensus covering agreement, validity, and termination properties
- Flavours of State Machine Replication - Ittai Abraham - Taxonomy of SMR variants: crash vs Byzantine failures, synchronous vs asynchronous, and their trade-offs
- Consensus for State Machine Replication - Kartik Nayak, Ittai Abraham - Shows how single-shot consensus is extended to replicate a full state machine across nodes
- From Single-Shot Agreement to State Machine Replication - Walks through the reduction from state machine replication to repeated instances of consensus
- On settlement finality - Ethereum Blog - Distinguishes probabilistic finality (Bitcoin) from economic finality (PoS) and their practical implications
- Finality in Blockchain Consensus - Mechanism Labs - Compares different finality models across blockchain protocols and their security guarantees
- The mystery behind block time - Explains how block time is determined by difficulty adjustment and its relationship to security and throughput
- What everyone gets wrong about 51% attacks - Dankrad Feist - Clarifies that 51% attacks cannot steal funds or change rules, only double-spend and censor transactions
- Blockchain papers - decrypto-org - Curated collection of academic blockchain research papers organized by topic
- An Empirical Analysis of Chain Reorganizations and Double-Spend Attacks on Proof-of-Work Cryptocurrencies - MIT - Measures how often chain reorgs actually happen in practice and quantifies real-world double-spend risk
- E48: The role of decentralization, China/US break down & more with Bestie Guestie Balaji Srinivasan - Discussion on why decentralization matters geopolitically and how crypto fits into US-China dynamics
- Two general's Problem
- What Is the Byzantine Generals Problem?
- The Byzantine Generals Problem - The original Lamport, Shostak, and Pease paper proving consensus requires more than two-thirds honest participants
- Blockchain Basics & Consensus - MIT 15.S12 Blockchain and Money - Gary Gensler - MIT lecture series covering blockchain fundamentals, proof-of-work, and how Bitcoin achieves consensus
- Paxos(etcd) vs. Nakamoto(Bitcoin): consensus - Side-by-side comparison of classical BFT consensus (Paxos) and Nakamoto consensus trade-offs
- Nakamoto's Longest-Chain Wins Protocol - Formal analysis of why following the longest chain achieves consensus under honest majority assumptions
- Learning-Bitcoin-from-the-Command-Line - Hands-on tutorial for interacting with Bitcoin Core via CLI, covering wallets, transactions, and scripting
- Bitcoin: A Peer-to-Peer Electronic Cash System - The original Satoshi Nakamoto whitepaper describing proof-of-work, the UTXO model, and the incentive structure
- But how does bitcoin actually work? - Visual explanation by 3Blue1Brown of how digital signatures, hashing, and proof-of-work combine to form Bitcoin
- Cryptoeconomics In 30 Minutes by Vitalik Buterin - Vitalik explains how economic incentives and cryptography work together to secure decentralized protocols
- The differences between a hard fork, a soft fork, and a chain split - Clarifies how protocol upgrades work and when they cause chain splits versus backward-compatible changes
- Solidity
- ERC20
- ERC721
- ERC-1155
- Merkle Patricia Trie Tree
- DEVCON1: Understanding the Ethereum Blockchain Protocol - Vitalik Buterin - Vitalik walks through Ethereum's architecture including accounts, gas, the EVM, and state transitions
- Ethereum Whitepaper - The founding document describing Ethereum as a general-purpose programmable blockchain with smart contracts
- Learn Solidity in Y Minutes - Quick-reference syntax tour of Solidity covering types, functions, modifiers, and common patterns
- Getting Started with Solidity - Beginner tutorial covering Solidity basics, contract structure, and deploying your first smart contract
- OpenZeppelin - Battle-tested library of reusable smart contracts for ERC20, ERC721, access control, and upgradeable proxies
- Go Ethereum - Official documentation for Geth, the most widely used Ethereum execution client written in Go
- Trie, Merkle, Patricia: A Blockchain Story - Explains how Ethereum combines tries, Merkle trees, and Patricia trees to store world state efficiently
- Ethereum development made easy with Foundry - Getting started guide for Foundry, a fast Rust-based toolchain for compiling, testing, and deploying Solidity
- scaffold-eth: forkable Ethereum dev stack focused on fast product iterations - Full-stack Ethereum starter kit with React frontend, Hardhat backend, and one-command local deployment
- Scaffold-Eth Challenges - Progressive coding challenges to learn Ethereum development by building real DeFi and NFT projects
- solmate - Modern, opinionated, and gas optimized building blocks - Rari Capital - Gas-optimized Solidity library providing minimal, audited implementations of common token and auth patterns
- CNBC: People are paying millions of dollars for digital pictures of rocks (NFTs) - News piece illustrating the NFT mania of 2021 and how ERC-721 tokens created a digital collectibles market
- DEX: Uniswap
- Lending: Aave
- Stablecoin: Maker/DAI
- dYdX
- Metamask and other wallets - Browser extension wallet for interacting with Ethereum dApps, managing keys, and signing transactions
- DEMO: Uniswap, Curve, OpenSea NFTs, Maker/Oasis, Multisig
- lil web3: Small, focused, utility-based smart contracts - Minimalist implementations of common web3 protocols like ENS, Uniswap, and NFT marketplaces for learning
- Programming DeFi: Uniswap V2. Part 1 - Build Uniswap V2 from scratch: core pair contract, constant product formula, and liquidity provision
- The Problems with DeFi & Crypto - Critical analysis of DeFi risks including smart contract bugs, oracle manipulation, and systemic leverage
- Programming DeFi: Uniswap V2. Part 1 - Line-by-line annotated walkthrough of the official Uniswap V2 Solidity source code
- Programming DeFi: Uniswap V2. Part 2 - Implements the Uniswap V2 router, multi-hop swaps, and slippage protection
- Programming DeFi: Uniswap V2. Part 3 - Adds flash swaps, price oracles via TWAP, and protocol fee mechanisms to the Uniswap V2 implementation
- Uniswap V3 Development Book - Full book on building Uniswap V3 with concentrated liquidity, tick-based accounting, and multiple fee tiers
- Hayden Adams Explains Uniswap and the Rise of DeFi - Uniswap creator tells the origin story and explains how automated market makers replaced order books
- What's the simplest possible decentralized stablecoin? - Jacob Eliosoff - Thought experiment exploring the minimal mechanism needed to peg a token to a dollar without centralization
- Awesome Foundations of DeFi - Mikerah - Curated list of academic papers on AMMs, lending protocols, liquidations, and other DeFi primitives
- Oracles
- Bridges
- An Incomplete Guide to Rollups - Vitalik explains how optimistic and ZK rollups scale Ethereum by executing off-chain while posting data on-chain
- EVM codes - Interactive reference for every EVM opcode with gas costs, stack inputs/outputs, and execution behavior
- EVM: From Solidity to byte code, memory and storage - Video walkthrough of how Solidity compiles to bytecode and how the EVM manages memory, storage, and the stack
- Ethereum Virtual Machine - Visual introduction to EVM architecture including the call stack, gas metering, and contract execution flow
- EVM Deep Dives: The Path to Shadowy Super Coder - Part 1 - Deep dive into EVM internals: how function selectors, memory layout, and storage slots work at the bytecode level
- Contract ABI Specification - Solidity Docs - Official spec for how Solidity encodes function calls and return values for inter-contract communication
- Capture the Ether - CTF-style challenges teaching Ethereum security by exploiting vulnerable smart contracts
- Ethernaut - Progressive wargame where you hack intentionally vulnerable Solidity contracts to learn common attack patterns
- Damn Vulnerable DeFi - Advanced CTF focused on DeFi-specific attacks including flash loans, price manipulation, and governance exploits
- Solidity Security: Comprehensive list of known attack vectors and common anti-patterns - Reference catalog of Solidity vulnerabilities including reentrancy, integer overflow, and delegatecall pitfalls
- MISO War Room - Mudit Gupta - Post-mortem of the SushiSwap MISO exploit detailing how the team discovered, analyzed, and mitigated the attack
- Critical privacy vulnerability getting exposed by MetaMask - Disclosure of how MetaMask leaked user IP addresses to Infura, compromising wallet privacy
- echidna - Ethereum smart contract fuzzer - Property-based fuzzer that tests Solidity contracts by generating random transactions to find invariant violations
- manticore - Symbolic execution tool - Explores all reachable program paths in EVM bytecode to find bugs like reentrancy and integer overflows
- mythril - Security analysis tool for EVM bytecode - Automated vulnerability scanner using symbolic execution and taint analysis to detect common Solidity flaws
- surya - A Solidity inspection tool - ConsenSys - Generates call graphs, inheritance trees, and function visibility reports to audit Solidity contract structure
- MEV101 - Introduction to Maximal Extractable Value - Introductory slide deck explaining what MEV is, how searchers extract it, and why it matters for users
- MEV - Paradigm research overview of MEV taxonomy including frontrunning, backrunning, sandwiching, and liquidations
- How To Get Front-Run on Ethereum mainnet - Live demo showing how a mempool transaction gets detected and front-run by a bot in real time
- Video: Honeypots in Ethereum And How To Avoid Them With Tenderly.co Transaction Simulation - Shows how MEV honeypot contracts lure bots and how to use transaction simulation to detect them
- The Anatomy of an Inspector - Flashbots - Explains how Flashbots built mev-inspect to classify and measure MEV extraction across Ethereum blocks
- The Hidden World of Ethereum Snipers - Samneet Chepal - Investigation of token sniping bots that buy new tokens at launch by monitoring contract deployments
- Zcash - Technical blog posts from the Zcash team explaining shielded transactions, the Sapling upgrade, and zk-SNARK circuits
- Aztec Network - Privacy-first L2 rollup on Ethereum using zk-SNARKs for confidential transactions and private smart contracts
- zksnarks - ZK Hack whiteboard session covering zk-SNARK intuition, the trusted setup, and how proofs are generated and verified
- Arithmetization I - StarkWare STARK Math - Explains how computational claims are converted into polynomial equations, the first step in building STARKs
- Arithmetization II - StarkWare STARK Math - Continues with constraint composition and how the low-degree testing step verifies polynomial identities
- Announcing Dark Forest - a zkSNARK game - Introduces a fully on-chain strategy game using zk-SNARKs so players can prove moves without revealing positions
- Umbra: How does Umbra compare to Tornado Cash and Aztec? - Comparison of stealth address privacy (Umbra) versus mixing (Tornado Cash) and rollup privacy (Aztec)
- STARKs, Part I: Proofs with Polynomials - Vitalik Buterin - Builds intuition for STARKs by showing how polynomial evaluations can prove computational statements without trusted setup
- An approximate introduction to how zk-SNARKs are possible - Vitalik Buterin - Accessible walkthrough of zk-SNARK construction from polynomial commitments through quadratic arithmetic programs
- Data Availability
- Optimistic versus Zero Knoweledge Rollups
- Circom, Cairo, Noir
- Data, Consensus, Execution: Three Scalability Bottlenecks for State Machine Replication - Ittai Abraham - Framework decomposing blockchain scalability into three independent bottlenecks that must each be solved
- Understanding Blockchain Latency and Throughput - Lefteris Kokoris-Kogias - Rigorous analysis of what actually limits blockchain throughput and why naive metrics are misleading
- (Almost) Everything you need to know about Optimistic Rollup - Georgios Konstantopoulos - Comprehensive explainer of optimistic rollup mechanics including fraud proofs, challenge periods, and data posting
- Why rollups + data shards are the only sustainable solution for high scalability - Polynya - Argues that L1 execution scaling hits decentralization limits and only rollups with data availability solve the trilemma
- Volitions: best of all worlds - Polynya - Introduces volitions as hybrid rollups where users choose between on-chain and off-chain data availability per transaction
- Volition and the Emerging Data Availability Spectrum - StarkWare - StarkWare's design for letting applications pick their data availability trade-off between cost and security
- What is the difference between PBFT, Tendermint, SBFT and HotStuff? - Ittai Abraham - Compares four BFT protocols on message complexity, view-change overhead, and leader rotation strategies
- DAG Meets BFT - The Next Generation of BFT Consensus - Ittai Abraham - Explains how DAG-based mempool protocols like Narwhal decouple data dissemination from consensus ordering
- MetaAnalysis of Alternative Consensus Protocols - Mechanism Labs - Structured comparison of consensus protocols including Avalanche, Solana, Algorand, and others
- FLP and CAP aren't the same thing - Clarifies the distinct impossibility results of FLP (consensus in async systems) versus CAP (consistency vs availability)
- FLP and CAP - Dinhtta - Concise explanation of the FLP impossibility theorem and the CAP theorem with examples of how systems navigate them
- Segregated Witness - BIP-141 specification that separates witness data from transactions, fixing malleability and increasing block capacity
- Taproot: SegWit version 1 spending rules - BIP-341 specification enabling Schnorr signatures and MAST for cheaper, more private complex spending conditions
- Covenants: CHECKTEMPLATEVERIFY (BIP-119) - BIP-119 proposal for restricting how coins can be spent, enabling vaults, congestion control, and payment pools
- A Look at the Lightning Network - Lyn Alden - Balanced assessment of Lightning Network's design, adoption, trade-offs, and viability for scaling Bitcoin payments
- The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments - The original paper describing bidirectional payment channels and how they compose into a routed payment network
- Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction - Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder - Textbook covering Bitcoin mechanics, mining, anonymity, and altcoins; suitable for students and developers new to crypto
- Security Engineering - Ross Anderson - Encyclopedic reference on building secure systems, covering cryptography, protocols, and real-world failure case studies
- Foundations of Distributed: Consensus and Blockchains - Elaine Shi - Graduate-level textbook formalizing consensus, Byzantine fault tolerance, and blockchain protocols with mathematical rigor
- Handbook of Applied Cryptography - Menezes, van Oorschot and Vanstone - Comprehensive reference covering algorithms and protocols for symmetric crypto, public-key crypto, and key management
- Crypto 101 - lvh - Free introductory cryptography book aimed at programmers who want practical understanding without heavy math
- An Introduction to Mathematical Cryptography - Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman - Undergraduate textbook connecting number theory and algebra to RSA, Diffie-Hellman, lattices, and elliptic curves
- A Course in Number Theory and Cryptography - Neal Koblitz - Classic graduate text covering number theory foundations with direct applications to RSA and elliptic curve cryptography
- Algebra for Applications - Arkadii Slinko - Introduces groups, rings, and fields through cryptographic and coding theory applications rather than pure abstraction
- A Computational Introduction to Number Theory and Algebra - Victor Shoup - Free textbook emphasizing algorithms for number theory and algebra, ideal for those who want to implement cryptographic primitives
- Elliptic Curves Number Theory and Cryptography - Lawrence C. Washington - Thorough treatment of elliptic curve math and its cryptographic applications, from basics through pairings
- The Prime Number Conspiracy - Thomas Lin - Collection of accessible essays from Quanta Magazine exploring deep patterns in prime numbers and modern number theory
- Practical Cryptographic Systems - Matthew Green - Johns Hopkins course on real-world cryptography covering TLS, secure messaging, cryptocurrencies, and common implementation mistakes
- Cryptocurrency Class 2022 - Patrick McCorry - University course covering Bitcoin, Ethereum, payment channels, and layer-2 scaling with practical assignments
- Principles of Blockchains - Pramod Viswanath - Illinois ECE course formalizing blockchain scalability, consensus protocols, and the data-consensus-execution framework
- Blockchain And Money - Gary Gensler - MIT Sloan course examining blockchain through the lens of finance, regulation, and use cases beyond cryptocurrency
- Decentralized Finance MOOC - Dan Boneh, Arthur Gervais, Andrew Miller, Christine Parlour and Dawn Song - Multi-university course covering DeFi mechanics, AMMs, lending, stablecoins, and protocol security
- Stanford CS 251 Blockchain Technologies - Dan Boneh - Stanford course covering consensus, smart contracts, DeFi, and privacy from a computer science perspective
- Stanford EE374 Blockchain Foundations - David Tse, Dionysis Zindros - Stanford course focusing on the theoretical foundations of consensus protocols, longest-chain analysis, and PoS security
- ECE595 Foundations of Blockchain Systems - Sreeram Kannan - UW course on blockchain systems theory covering consensus, sharding, data availability, and restaking
- CS598CAL Consensus Algorithms - Ling Ren - Illinois graduate seminar on consensus algorithms covering Paxos, PBFT, HotStuff, and DAG-based protocols
- Dan Boneh's Online Cryptography Course - Stanford - Stanford's free online course covering symmetric encryption, public-key crypto, and authenticated encryption from first principles
- Light Clients
- UTXO vs Account model
- The Blockchain Trilemma
- PoS vs PoW
- Soft Forks vs Hard Forks
- Onchain vs offchain computation
- Chinese remainder theorem
- One Time Pad
- MAC
- Account Abstraction (argent x)
- Finality
- muun, non custodial wallets
These resources were recently found and have not been reviewed yet.
- Binius: Succinct Arguments over Towers of Binary Fields - Diamond & Posen - Proofs over binary fields, dramatically cheaper for hash-heavy computations
- Jolt: SNARKs for Virtual Machines via Lookups (Eurocrypt 2024) - RISC-V zkVM built almost entirely from lookup arguments, ~10x speedup
- Lasso: Lookup Arguments (Eurocrypt 2024) - Prover cost scales only with number of lookups, not table size
- LogUp: Logarithmic Derivatives for Lookups - Haböck (Polygon) - Standard lookup technique inside Plonky3 and production STARKs
- Nova: Recursive Zero-Knowledge Arguments from Folding Schemes (CRYPTO 2022) - Lightweight alternative to SNARKs for incrementally verifiable computation
- HyperNova: Recursive Arguments for Customizable Constraint Systems (CRYPTO 2024) - Generalizes Nova to CCS (subsumes R1CS, Plonkish, AIR)
- SuperNova: Proving Universal Machine Executions without Universal Circuits - Non-uniform IVC with different circuits per step
- The Future of MEV is SUAVE - Flashbots - Cross-chain MEV network to prevent builder centralization
- MEV-Share: Programmably Private Orderflow - Flashbots - Users control what searchers see, MEV returned to originators
- Who Wins Ethereum Block Building Auctions and Why? - ~3 builders control 80% of blocks via private order flow feedback loops
- Based Rollups: Superpowers from L1 Sequencing - Justin Drake - L1 validators as rollup sequencers
- EIP-4844: Proto-Danksharding - Blob transactions and KZG commitments, reduced rollup costs 10-100x (Dencun, March 2024)
- EigenLayer Whitepaper - Sreeram Kannan et al. - Restaking to extend ETH security to new protocols including EigenDA
- Narwhal and Tusk: DAG-based Mempool and BFT Consensus - 130,000+ tx/sec, foundation for Sui, Aptos, Linera
- Mysticeti: Low-Latency DAG Consensus (NDSS 2025) - First DAG consensus to commit in 3 message delays, <400ms on Sui
- Shoal++: High Throughput DAG BFT Can Be Fast! (2024) - Average commit latency of 4.5 message exchanges
- fhEVM: Confidential EVM Smart Contracts Using FHE - Zama - First framework for Solidity contracts operating over encrypted state
- Concrete ML: Privacy-Preserving ML with FHE - Zama - Standard ML models on encrypted data via TFHE
- Circle STARKs - Haboeck, Levit, Papini (2024) - STARKs over Mersenne prime p = 2^31 - 1, achieving ~1.4x speedup over BabyBear-based STARKs
- Stwo Prover - StarkWare (2024) - Next-gen open-source STARK prover implementing Circle STARKs; 940x faster than Stone, live on Starknet
- Polygon Plonky3 (2024) - Modular ZK proving toolkit for custom zkVMs/zkEVMs; 5-10x faster than Plonky2, adopted by SP1 and Valida
- SP1 Hypercube - Succinct Labs (2025) - Multilinear-polynomial zkVM proving Ethereum blocks in under 12 seconds on 16 GPUs; first real-time L1 prover
- Verifying Jolt zkVM Lookup Semantics - Kwan, Dao, Thaler (2024) - Formal verification of all Jolt RV32I instruction lookups using ACL2 theorem prover
- EIP-7702: Set Code for EOAs - Buterin et al. (2024) - EOAs temporarily delegate to smart contract code; enables batching, gas sponsorship; shipped in Pectra (May 2025)
- Analysis of Order Flow Auction under PBS - Ma, Tang, Yao (2025) - Game-theoretic model of OFA + block-building showing builder centralization dynamics
- Quantifying Price Improvement in Order Flow Auctions - Bachu, Wan / Uniswap Labs (2024) - Open-source methodology; dutch-auction OFAs yield 4-5 bps average price improvement
- SoK: Ethereum's Enshrined Proposer Builder Separation - Koegler (2025) - Systematization of ePBS mechanisms and gaps in current PBS designs
- BitVM: Quasi-Turing Complete Computation on Bitcoin - Aumayr et al. (2024) - Formal analysis proving arbitrary computation encodable in Bitcoin Script via fraud proofs without consensus changes
- BIP-347: OP_CAT in Tapscript - Heilman, Sabouri (2024) - Reactivating OP_CAT for covenants, vaults, and ZK-proof verification on Bitcoin
- SoK: DAG-based Consensus Protocols (2024) - Classifies DAG-BFT protocols into availability- vs consistency-focused, analyzing security and fairness
- Beyond the Whitepaper: Where BFT Meets Reality - Wong, Kolegov, Mikushin (2024) - Lessons from auditing production BFT systems; catalogs logic errors, concurrency bugs, crypto pitfalls
- Migration to Post-Quantum: From ECDSA to ML-DSA - Dinu (2025) - Practical comparison for blockchain signatures covering side-channel and fault-injection countermeasures
- NIST FIPS 203/204/205 Post-Quantum Standards (August 2024) - ML-KEM, ML-DSA, SLH-DSA finalized; mandates deprecation of quantum-vulnerable algorithms by 2035
- PropertyGPT: LLM-driven Formal Verification of Smart Contracts - Liu et al. (NDSS 2025) - GPT-4 with RAG to auto-generate formal properties; detected 26 CVEs and 12 zero-days
- Blockchain Cross-Chain Bridge Security: Challenges, Solutions, and Future Outlook (ACM DLT, 2024) - Survey of bridge architectures with security analysis and taxonomy of bridge exploits