Advancing Cryptographic Security

Proven expertise in cryptographic research, protocol audits, and real-world implementations.

Why Our Cryptographic Expertise Stands Out

We Lead in Research and Auditing

  • Contributions to industry standards
  • Deep cryptographic protocol analysis in zero-knowledge systems and multi-party computation
  • Track record of auditing ZK systems and complex cryptographic protocols

Our Work on the MoonMath Manual

  • Educating the next generation of cryptographers
  • Ongoing contributions and updates
  • Read more about the MoonMath Manual here

Implementation and Real-World Cryptography

  • We don’t just analyze — we build and implement cryptographic systems like PrivateStorage
  • We also use formal verification tools to attest correctness of protocols and implementations

Advanced Cryptographic and Zero-Knowledge Consulting

We Help with the Hard Stuff

Clients trust us to consult with them on new and emerging cryptographic protocols:

  • Threat Modeling
  • Auditing
  • Formal Verification
  • Research and Design
  • Implementation

Proven experience in zkSNARK systems, elliptic curves, zkEVMs, and more:

  • zkSNARKs: Groth16, Plonk-ish systems, STARKs
  • Elliptic Curves
  • MPC: Threshold Signatures
  • Consensus Mechanisms
  • zkEVMs
  • Formal Verification Tools for Cryptography
  • Secure Communication

List of Cryptography / Zero-Knowledge Audits Conducted

Click here for examples of our cryptography auditing work

Click here for examples of our ZK auditing work

ZK and Beyond — It’s More Than a Buzzword

Cryptography is foundational, and ZK is just one part of the bigger picture.

We work across various cryptographic domains, including consensus, authentication, and privacy-enhancing tech.

Thought Leadership and Industry Presence

Talks and Presentations

The Mathematics behind zkSNARKS

In this workshop, Mirco Richter review the mathematical principles of verified computing as described in the Pinocchio protocol. The session includes the concepts of circuits, quadratic arithmetic programs and verified computation.

Distributed Password-Authenticated Symmetric-Key Encryption

Poulami Das presents DPaSE, a new protocol for secure, user-friendly cloud encryption that allows users to encrypt data using only a password, without exposing them to online or offline attacks.

ZKAPs: Payment-based Access to Your Application

In this video from zkSummit 2020, Anna Kaplan discusses how privacy-preserving technology like ZKAPs enables unlinkable access control and empowers users to manage their own data.

ZK and Cryptography-focused Conferences We Attend and Support

  • Real World Crypto
  • High Assurance Crypto (HACS)
  • ZK Proof
  • ZK Hack
  • FHE Conference
  • ETHCC
  • Web3 Summit
  • Dweb Camp
  • ZK Summit

Ready to Work with Us?

For Protocol Teams Needing a Consultation

If you’re developing a novel cryptographic protocol or are implementing one for the first time, you need a partner with real cryptographic experience. Work with a team that understands your goals and design.