You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Supporting STARK friendly hash functions for proof commitments will be a great step forward to supporting recursive STARKs. miniSTARK uses RustCrypto's Digest trait as an interface for hash functions.
The text was updated successfully, but these errors were encountered:
andrewmilson
changed the title
Use ZK friendly hash functions for proof commitments
Use STARK friendly hash functions for proof commitments
Nov 14, 2022
@andrewmilson
In above example, it seems like blake2s and keccak256 are both masked so that they only have 80 bits of (collision-resistance) security. Is it speed-up technique for recursive STARK computation, or do you have any other intention there?
Supporting STARK friendly hash functions for proof commitments will be a great step forward to supporting recursive STARKs. miniSTARK uses RustCrypto's Digest trait as an interface for hash functions.
The text was updated successfully, but these errors were encountered: