This article is a follow-up of the excellent blog post written last year by Pascal Junod. This explains the strange title. The former post was
Category: zero-knowledge
Implementing ZK-focused hash schemes
In my last post, I described the ZK-oriented Ciminion AE (Dobraunig et al., 2021) scheme and implemented it using the circom2 DSL for writing zkSNARK
Implementing a ZK-focused authenticated-encryption scheme
In the last few years, several practitioners have proposed zk-focused cryptographic constructions such as hashing and encryption primitives that operate on binary and prime fields