Abstract: In this paper, we classify zk-friendly hash functions into three categories based on their inner structure. We explain the structures, name existing use cases, and analyze their performance.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results