By Kanza NadeemEver heard the story about a Zappos employee ordering a bouquet for a customer who, they learned, had a medical condition affecting her feet? Or when a flight attendant on Southwest Airlines when learned that a passenger was flying to attend the funeral of a loved one, wrote a heartfelt note on a napkin […]
Introduction:In our previous article Merkle Tree construction we had briefly discussed the formation of the Merkle Tree using the Reed Solomon Code. In this article we will look into the depth of how a 2k by 2k matrix is constructed in light clients.Reed Solomon Erasure Coding:In order to form a merkle tree using the reed solomon coding […]
Ever wondered how satellite communication works when there is so much noise in the environment? Or how can we still play our games on a CD which might have lost some data by little scratches over them? It’s all possible because of the efforts of two scientists Irving S. Reed and Gustave Solomon. In 1960, […]
In recent times, we on twitter are witnessing a frequent discussion about the Data Availability Problem and its importance. There is no doubt in how L2 solutions are empowering ethereum’s vision to be a global super computer. However, we can’t deny the fact that even with L2s we can’t achieve what we have envisioned due […]
TLDR; In this article, we are gonna discuss what resource pricing is and how we can limit and price the submission of transactions that get included in the chain. We will also discuss the trade-offs between different approaches that can help us to understand and improve the status quo of resource pricing. Excited? Let’s quickly […]
BackgroundXord is a Web3 R&D and Investment Company helping to contribute to the development of technology and funding new ventures. We are a mission-driven company, and being mission-driven means existing for a purpose.In just over three years that we have existed, we have reinvented ourselves many times. We have tried many new things and seen failures, […]
STARKs revolves around the idea of computational integrity, which essentially means that the output of a specific computation is correct.In traditional financing, where banks are involved, trusted third parties such as auditors, accountants, etc ensure their integrity. Whereas in the crypto world, the integrity of computed data is verified by reading the whole proof. This proves […]
Zero-knowledge proofs are cryptographically advanced proofs which are being used by many blockchain protocols to attain privacy and scalability. Though the more these proofs look sophisticated, the more complexity is inherent within them. In the second series of our publication, we are going to discuss the pre-processing of ZK-SNARK and how a multi-trusted computation setup […]
This article aims to reach a conclusion and spread awareness about the interactive cryptographic systems and non-interactive cryptographic systems and the common difference that differentiate the two. The algorithms to be discussed in this article are Diffie Hellman (DH), Rivest Shamir Adleman (RSA), Schnorr Signature Scheme, Schnorr Identification Scheme, Digital Signature Algorithm (DSA), and FIAT Shamir.IntroductionThe […]
This article is greatly inspired by Vitalik explanation on Quadratic arithmetic programs(QAPs). In this article we are going to take a direct approach to understand the complex step in making snarks or you may say that the first step of representing the massive state data into a low degree polynomial. If you are not familiar […]