Security Consulting » Cryptographic Expertise
Security Consulting » Cryptographic Expertise
Advancing Cryptographic Security
Proven expertise in cryptographic research, protocol audits, and real-world implementations.
Why Our Cryptographic Expertise Stands Out

We Lead in Research and Auditing
- Contributions to industry standards
- Deep cryptographic protocol analysis in zero-knowledge systems and multi-party computation
- Track record of auditing ZK systems and complex cryptographic protocols

Our Work on the MoonMath Manual
- Educating the next generation of cryptographers
- Ongoing contributions and updates
- Read more about the MoonMath Manual here

Implementation and Real-World Cryptography
- We don’t just analyze — we build and implement cryptographic systems like PrivateStorage
- We also use formal verification tools to attest correctness of protocols and implementations
Advanced Cryptographic and Zero-Knowledge Consulting

We Help with the Hard Stuff
Clients trust us to consult with them on new and emerging cryptographic protocols:
- Threat Modeling
- Auditing
- Formal Verification
- Research and Design
- Implementation
Proven experience in zkSNARK systems, elliptic curves, zkEVMs, and more:
- zkSNARKs: Groth16, Plonk-ish systems, STARKs
- Elliptic Curves
- MPC: Threshold Signatures
- Consensus Mechanisms
- zkEVMs
- Formal Verification Tools for Cryptography
- Secure Communication
List of Cryptography / Zero-Knowledge Audits Conducted
Click here for examples of our cryptography auditing work
Click here for examples of our ZK auditing work


ZK and Beyond — It’s More Than a Buzzword
Cryptography is foundational, and ZK is just one part of the bigger picture.
We work across various cryptographic domains, including consensus, authentication, and privacy-enhancing tech.
Thought Leadership and Industry Presence
Talks and Presentations
The Mathematics behind zkSNARKS
In this workshop, Mirco Richter review the mathematical principles of verified computing as described in the Pinocchio protocol. The session includes the concepts of circuits, quadratic arithmetic programs and verified computation.
Distributed Password-Authenticated Symmetric-Key Encryption
Poulami Das presents DPaSE, a new protocol for secure, user-friendly cloud encryption that allows users to encrypt data using only a password, without exposing them to online or offline attacks.
ZKAPs: Payment-based Access to Your Application
In this video from zkSummit 2020, Anna Kaplan discusses how privacy-preserving technology like ZKAPs enables unlinkable access control and empowers users to manage their own data.
ZK and Cryptography-focused Conferences We Attend and Support
- Real World Crypto
- High Assurance Crypto (HACS)
- ZK Proof
- ZK Hack
- FHE Conference
- ETHCC
- Web3 Summit
- Dweb Camp
- ZK Summit
Ready to Work with Us?
For Protocol Teams Needing a Consultation
If you’re developing a novel cryptographic protocol or are implementing one for the first time, you need a partner with real cryptographic experience. Work with a team that understands your goals and design.