Blog

Linea – zkEVM Crypto Beta v1

Consensys Software, Inc. requested that Least Authority perform a security audit of Linea zkEVM (crypto-beta-v1) and cryptography libraries. Linea implements zkEVM based on the Wizard protocol and the gnark library. Our final audit report was completed on November 26, 2024. To read the full report, including our findings, click here:

Read More »

Linea – Gnark Cryptographic Library

Consensys Software, Inc. requested that Least Authority perform security audits of the Linea prover and cryptography libraries. This audit is Phase 1 and focuses specifically on the gnark library. Our final audit report was completed on September 20, 2024. To read the full report, including our findings, click here: Report

Read More »

Building the Zero-Knowledge Community: Engagement, Events, and Advocacy

The zero-knowledge space is rapidly gaining traction as privacy becomes a critical concern due to the daily news of data breaches that expose personal information to malicious actors. With the exponential growth of data collection and the increasing reliance on cloud services and decentralized technologies, individuals and organizations are seeking

Read More »

Polygon – Starky and zkEVM Kernel

Our team performed a security audit of Starky and zkEVM Kernel code in Polygon‘s zkEVM implementation. Our final audit report was completed on August 22, 2024. To read the full report, including our findings, click here: Report

Read More »

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »

Mina – Pickles

Least Authority performed a security audit of Pickles, Mina’s inductive zk-SNARK composition system. We completed our final audit report on December 13, 2023. To read the full report including our findings, click here: Report

Read More »

Integrating Advanced Cryptographic Techniques (ZKPs, MPC and FHE) with Artificial Intelligence (AI) and Machine Learning (ML)

Through our work, we have the opportunity to speak with various people in the FinTech, Cybersecurity, and Web3 fields. Recently, one pattern emerged: there is increasing interest in advanced cryptography techniques and protocols, such as zero-knowledge proofs (ZKPs), secure Multi-Party Computation (MPC), and Fully-Homomorphic Encryption (FHE), which can improve users’

Read More »
Archives