Skip to main content

Learn about security from the best.

We’re committed to research and open source. From tutorials and explainers to hack breakdowns, news, and more, read the latest research from our team.

Thumbnail for post: How Do MPC Wallets Work?
Cayden Liao

Latest research

Filters
Filters:
Mohit
A look into Signal's use of Ristretto hashes and zero-knowledge proofs for usernames
The Zellic Team
DARPA awarded Zellic $1M in the AI Cyber Challenge's Small Business Track
Cayden Liao
A primer on MPC wallets and their security features and pitfalls
BaarkingDog
How does Zcash work? Understanding Zerocash and Zcash
Malte Leip
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack IV
Stephen Tong
Building an implementation of garbled circuits from the ground up
Mohit
A look into the ZK audit process and techniques the leading ZK auditors employ to examine ZK circuits
Malte Leip
An introduction to what pairings are and how they are motivated, with a particular focus on elliptic curve pairings.
Faith
A look into how Zellic helped fix a critical vulnerability in Astar
Faith
The blog post was written by a security researcher and auditor here at Zellic, Faith.
BaarkingDog
An in-depth guide to secure random number generation
Vlad Toie
A helpful guide for users and builders