Poseidon{2} for Noir
It has been some time since our last blog post (3 months already, time flies) - so it is way overdue to continue our loose series of blog posts about zk-friendly hashing. In case you missed the other two posts, feel free to read about how to choose your zk-friendly hash function …
How to choose your ZK-friendly hash function?
In our last blog post we investigated the usefulness of hash functions for zero-knowledge use cases. Thereby, we stumbled upon many ZK-friendly designs, each with advantages, disadvantages, and optimizations for different performance metrics. With MiMC1, GMiMC2, Poseidon3, Poseid…
What’s the deal with hash functions in Zero Knowledge?
When exposed to the ZK space, it usually takes little time to stumble upon some alien hash functions for the average crypto engineer - most likely Poseidon1. So, for the curious, in this blog post, we want to shed some light on the history of efficient hash functions in ZK and wh…