-
Lately I've developed a few strategies to reduce axiom usage, but most of the time they require manual work, which is difficult to scale up. I've used Rumm for quite some time now, and it looks the cl…
-
## TODOs as of 2023-10-19:
1. **Authorship Clarification**: Discuss and decide who should be listed as authors based on their contributions.
2. **Core Circuits Expansion**: Provide more details on…
-
*Allocator Application*
## Application Number
recfkjiR7qrmBCLRc
## Organization Name
Cyberhash
## Organization On-chain Identity
f1k67d7ggf3me4ce3t7a45vwmz3krrr2ce4f76d3q
## Allocator Pathway Nam…
-
**Github username:** @0xmahdirostami
**Twitter username:** 0xmahdirostami
**Submission hash (on-chain):** 0x8ab813928c2f33a6c444369efda328c6b30d66e814b93504197b0d89437057c8
**Severity:** medium
**De…
-
_**Proposed Work:**_ Implement a general-purpose, open-source WebGPU-based Groth16 prover to accelerate client-side proof generation for the Penumbra Protocol.
**_Phases:_** The end-to-end WebGPU …
-
# Lines of code
https://github.com/Tapioca-DAO/tapioca-yieldbox-strategies-audit/blob/05ba7108a83c66dada98bc5bc75cf18004f2a49b/contracts/convex/ConvexTricryptoStrategy.sol#L189-L190
https://github.co…
-
What is the relationship between these different strategies for generating the correlation energy.
GW approximation is closely related to RPA.
RPA is closely related to EOM/response.
EOM respons…
-
With the advent of p2pool, coinbase enotes have become much more numerous on-chain, and consolidating p2pool coinbase enotes (which have very small amounts by design, so p2pool miners collect many sma…
-
https://arxiv.org/abs/1811.05441
> In this paper, we present a sound and extensible systematization
> of transient execution attacks. Our systematization
> uncovers 7 (new) transient execution at…
-
*Allocator Application*
## Application Number
rec4LIvJMtq4nscqk
## Organization Name
Cyberhash
## Organization On-chain Identity
f12ae7jvpql6bsglahxkwe5hqrp3trkzphli2euta
## Allocator Pathway Nam…