Blog

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »

World – SMPC Protocol

Least Authority performed a security audit of World’s SMPC Protocol for the uniqueness check of iris codes. To read the full report including our findings, click here: Report

Read More »

World – Protocol Cryptography (2nd Review)

Our team conducted a second review of the upgrades to World‘s semaphore-mtb and the signup sequencer. Previously, our team had conducted a review of an earlier version of the codebase, which included World’s Rust implementation of the semaphore protocol and the Go implementation of the Semaphore Merkle Tree Batcher (SMTB).

Read More »

Capsule – Signing and Permissioning Toolkit

Least Authority, performed a security audit of Capsule Signing and Permissioning Toolkit. The Capsule is designed as a support system, providing several software development kits (SDKs) as well as infrastructure that can be used by developers and partner projects. Our final audit report was completed on January 3, 2024. An

Read More »

Mina – Pickles

Least Authority performed a security audit of Pickles, Mina’s inductive zk-SNARK composition system. We completed our final audit report on December 13, 2023. To read the full report including our findings, click here: Report

Read More »

Integrating Advanced Cryptographic Techniques (ZKPs, MPC and FHE) with Artificial Intelligence (AI) and Machine Learning (ML)

Through our work, we have the opportunity to speak with various people in the FinTech, Cybersecurity, and Web3 fields. Recently, one pattern emerged: there is increasing interest in advanced cryptography techniques and protocols, such as zero-knowledge proofs (ZKPs), secure Multi-Party Computation (MPC), and Fully-Homomorphic Encryption (FHE), which can improve users’

Read More »
Archives