Learn about security from the best.
We’re committed to research and open source. From tutorials and explainers to hack breakdowns, news, and more, read the latest research from our team.
Latest research
Filters
Filters:
A look into Signal's use of Ristretto hashes and zero-knowledge proofs for usernames
DARPA awarded Zellic $1M in the AI Cyber Challenge's Small Business Track
A primer on MPC wallets and their security features and pitfalls
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack IV
Building an implementation of garbled circuits from the ground up
A look into the ZK audit process and techniques the leading ZK auditors employ to examine ZK circuits
An introduction to what pairings are and how they are motivated, with a particular focus on elliptic curve pairings.
A look into how Zellic helped fix a critical vulnerability in Astar
The blog post was written by a security researcher and auditor here at Zellic, Faith.
An in-depth guide to secure random number generation