Monolith

Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You

The rising popularity of computational integrity protocols has led to an increased focus on efficient domain-specific hash functions, which are one of the core components in these use cases. For example, they are used for polynomial commitments or …