Advertisement ยท 728 ร— 90

Posts by sasha

Post image

it's also a fairly forced acronym in the crypto case ๐Ÿ˜

5 days ago 1 0 0 0

This has felt like an impenetrable super hard-to-understand paper since the start of grad school, and it feels good to more or less understand Lasso/Twist and Shout. Minor warning that TaSSLE uses weird notation in a few places.

5 days ago 0 0 0 0
Preview
Unlocking the lookup singularity with Lasso This paper introduces Lasso, a new family of lookup arguments, which allow an untrusted prover to commit to a vector $a \in \mathbb{F}^m$ and prove that all entries of a reside in some predetermined t...

I recently spent some time reading "Unlocking the lookup singularity with Lasso" (eprint.iacr.org/2023/1216) and the sequel papers. I think TaSSLE (eprint.iacr.org/2024/1075) is the best companion/exposition work for understanding Lasso of the ones out there.

5 days ago 0 0 2 0
Post image

"keyses"??? did gollum name the variables in this paper?

1 week ago 0 0 0 0

I do think this weird ethics appendix does raise some good points about how the current ethics guidelines for security conferences just aren't that well suited to crypto papers

1 week ago 0 0 0 0
About the example ethics appendices in the USENIX Call for Papers TL;DRThe USENIX Security โ€˜26 Call for Papers has some examples of papers with well-written ethics appendices, which are now required to submit to the confere...

new blog post! The USENIX Security '26 Call for Papers has examples of the required Ethics Appendix which they think are well written. If you read the example ethics appendix for cryptography, it is actually somewhat strange: www.sasha.place/blog/2026/04....

1 week ago 0 0 1 0

i just got a cold email offering 70$ an hour for a "tutor" role where I would mentor a high school student on a research project to submit to high school science fairs. crazy stuff

2 weeks ago 1 0 0 0

They have now :D

2 weeks ago 0 0 0 0

have the notifications been sent yet?

2 weeks ago 0 0 2 0
Advertisement

these reviewers write (Very) Knowledgeable as an estimate of their knowledge levels. how?

4 weeks ago 0 0 0 0

more complaining about paper reviews: I have now twice gotten the paper review comment "can you do a tight, concrete security reduction?" for protocols using zk-SNARKs as a subcomponent. No paper in the applied SNARK literature does this! it's messy!

4 weeks ago 0 0 1 0

(taken from the Twist and Shout paper)

1 month ago 0 0 0 0
Post image

performative zk-SNARKs ๐Ÿ™„ wearing tote bags and stuff

1 month ago 0 0 1 0

New preprint is up! We put it up so we can submit to poster sessions, I will write more about it when it gets accepted.

1 month ago 1 0 0 0

credit where credit is due: this AI generated code is the only research-grade cryptography code I have ever seen that tried to properly do domain separation.

1 month ago 1 0 0 0
Post image Post image

typod zero-knowledge as "aero-knowledge". we're going aero knowledge baby ๐Ÿ˜Ž

2 months ago 1 0 0 0

this mistake is really scary because i can definitely see somebody looking at this and thinking "yeah looks fine"

2 months ago 0 0 0 0

when hashing a multiset with m elements in a field of size k, this achieves a security level of O(k^(1/(1 + log m)))!!! (see www.enseignement.polytechnique.fr/informatique...)

2 months ago 0 0 1 0

adventures in vibe coding cryptography: I was asked to review some AI generated cryptography code. It implemented a multiset hash function which computed the hash of a multiset by hashing each element individually with Poseidon, and then adding them together as field elements.

2 months ago 1 0 1 1
Advertisement

another complaint about zkVMs that isn't frequently brought up: for reasonably large programs, compiling/running your code takes a few minutes, which is super disruptive to staying focused.

2 months ago 0 0 0 0
Post image

a unique winter sight in College Park: a common sledding location is the hill next to the IONQ office :)

2 months ago 0 0 0 0

The other hair tearing moment is that we wanted our RISC-Zero code to interoperate with some optimized Nova circuits. Poseidon is comically slow on RISC-Zero because of the inefficiency of compiling large field operations to a 32 bit ISA (like 500k-1 million CPU cycles per hash).

2 months ago 0 0 1 0

I was looking over the former student's code and you could make it 3x faster by patching in the SHA-256 precompile. Like a 1 line change which is kind of buried in the documentation makes this fairly natural code 3x faster.

2 months ago 0 0 1 0
Trade-offs and Pitfalls in zkVM design (or, some ways to make your zkVM code 3-10 times slower) In the past few months, I have done some work writing optimized code for the Succinct SP1 zkVM. Tuning zkVM code is a remarkably fruitful area for finding wa...

I have to work on a project for grad school which uses the RISC-Zero zkVM. Reiterating a hot take I have had previously: zkVMs are not actually that developer friendly as soon as you need to try to optimize your code in any way!

2 months ago 0 0 1 0

There was a small proof I was stuck on, so I asked a few different AI assistants to help me prove it. They were all wrong, but ChatGPT did give a correct outline of a proof, where it was correct after working out the details.

2 months ago 0 0 0 0

and this is why they thought our application of Fiat Shamir is insecure.

3 months ago 0 0 0 0

i now realize that the reviewer's real issue is that they don't understand how a proof system like Spartan supports random in-circuit challenges (you generate randomness that depends on the private witness w by hashing the value of the polynomial commitment to the witness)

3 months ago 0 0 1 0
Advertisement

they also confused fixed point and floating point arithmetic and then used that confusion as a point against us.

3 months ago 0 0 1 0

and then says our protocol is potentially insecure because of this. Is this not common knowledge??? If you incorrectly implement F-S, the protocol will be insecure.

3 months ago 0 0 1 0

i got rejection #4 of grad school today! I got a new insane reviewer highlight: Our paper says "this protocol can be made noninteractive via the Fiat-Shamir transform" in a few places, and the reviewer comments "if you don't pass everything into the F-S hash function, this would be insecure".

3 months ago 0 0 1 0