Cryptographic protocols often start as software prototypes, yet ASIC and FPGA architectures can differ radically. We discuss some of the limitations on custom hardware and adaptations to existing protocols to make them more hardware-friendly.
Under the premise of fully custom hardware, we explore more efficient choices of prime numbers in STARKs. In particular, we show that designing trace tables over specific primes that have previously not been considered leads to smaller traces for …