Boojum: zkSync’s high-performance decentralized STARK proof system

1. Introduction On July 17, 2023, zkSync’s official twitter Say hello to Boojum announced that zkSync Era would be migrated to the Boojum proof system without regenesis. Boojum is a STARK proof system (Plonk + FRI), see the open source code: https://github.com/matter-labs/era-boojum/tree/main (Rust) Its characteristics are: Arithmetic representation in the form of PLONK: makes ZK […]

Nova-based SHA256 proof

1. Introduction Preface blog: SHA-256 algorithm and examples Nova code analysis Based on Nova’s SHA256 proof, see the open source code: https://github.com/avras/nova-sha256 Take the SHA-256 hash operation input as input as an example, where the SHA-256 algorithm and the example in: 1) “4. Padding” corresponds to the add_sha256_padding(input) function, which returns padded_input. 2) Each 512-bit […]

How to punish miners with false information in the blockchain, workload proof POW, consensus algorithm

Directory How to punish miners with false information in the blockchain Proof of Work POW What is Proof of Work? Now another question arises: What if someone else peeks at Xiao Ming’s answer and rushes to answer it? Why are blocks safe to broadcast? consensus algorithm summary How to punish miners with false information in […]

How to punish miners with false information in the blockchain, workload proof POW, consensus algorithm

Directory How to punish miners with false information in the blockchain Proof of Work POW What is Proof of Work? Now another question arises: What if someone else peeks at Xiao Ming’s answer and rushes to answer it? Why are blocks safe to broadcast? consensus algorithm summary How to punish miners with false information in […]

GPU server fool-proof installation of Anaconda, pytorch, tensorflow

1. Download Anaconda installation package, official website address, Tsinghua source address. After downloading from the official website to the local, you can upload the installation package to the server through file transfer, and use the Tsinghua source address to directly use wget to download the required version, for example: wget https://mirrors.tuna.tsinghua.edu.cn/anaconda/archive/Anaconda3-2022.05-Linux-x86_64.sh 2. Install Anaconda bash […]

Hungarian algorithm-related proof: why there is no need to consider the matching method of the original point; why only the left point needs to be traversed; why the vis array is not zeroed when backtracking

Hungarian Algorithm Related Proof ? This article will explain the reasons for the following questions when readers have mastered the Hungarian algorithm, so as to help readers better understand the rationality of the Hungarian algorithm: Why do you not need to consider the matching method/connection method of the original point when searching whether the current […]

learn_C_deep_9 (understand the meaning of return from the assembly point of view, various application scenarios of const, basic understanding and experimental proof of volatile)

Directory return keyword const keyword const modified read-only variables – – – cannot be modified directly! Can const-decorated variables be part of an array definition? const can only be initialized directly when it is defined, and cannot be assigned twice. Why? const modified pointer volatile keyword return keyword I don’t know if all of us […]