𝔽₂ and Beyond: A Gentle Guide to Field Extensions
Cutting-edge research and security discoveries that shape the ZK ecosystem
Premium ZK security assessments with fellowship-powered depth, formal verification, and cutting-edge tooling that traditional audits can't match.
Rate Limiting Nullifier Protocol
Privacy & Scaling Explorations
Elliptic Curve Anonymous Signature Aggregation
Persona Labs
Proof of Solvency Protocol
PSE
Proof of Solvency Protocol
PSE
ZK Circuit breakers, MPC Specialists, FHE experts, TEE geeks, seasoned Rustaceans and Cryptography connoisseurs
Halo2, Noir, ZKVM, MCP
The Circuit Whisperer
Compilers, Noir, ZKTLS
The Math Magician
Post-Quantum Crypto, MPC, LLD
Privacy Protocol Pioneer
Formal Verification, Cryptography, gnark, circom
Virtual Machine Virtuoso
GKR, Halo2
Protocol Standardization Sage
Discovered critical vulnerability in Halo2's constraint system with just 20 lines of code. Led formal verification of zkWasm instructions, pioneered underconstrained circuit detection methodologies, and developed halo2-starter for minimal security PoCs. Authored Binius blog series and contributed advanced cryptographic tooling in sagemath.
Current Focus: Leading automated circuit verification research and advancing next-gen ZK security tooling.