🍰 A collection of awesome knowledge about Web 3.0
Throughout this list you'll find emojis next to resources, here's what each of them indicates:
📜 Scientific paper
📚 Course, long series or complete series
💣 Collection of valuable resources
🏫 A programming library
📁 Documentation
📗 Specific, written tutorial
📹 Video tutorial
💫 Stellar resource, not from this earth
- Web 3.0 Definitions
- Mathematical Background
- Cryptography
- Computer Security
- Zero Knowledge
- Decentralized Finance
- Decentralized Identity
- Programming
- 💫 A Graduate Course in Applied Cryptography (Dan Boneh)
- 💣 Crypto Stackexchange
- 📗 Cryptopals - Collection of challenges on basic cryptography
- 📹 💫 ZK Hack - ZK Whiteboard sessions
- 💫 Proofs, Arguments and Zero-Knowledge (Justin Thaler)
- 💣 ZK Research
- 💣 ingopedia: A curated list of ZK resources and links.
- :video_camer: CESC ZKP Workshop
- 📚 Rust Crypto Engineering Course
- 📚 Rust Crypto Engineering Study Group
- 📹 Rust Crypto Engineering Study Group
- A curated list of multi party computation resources and links.
- Explore connected papers in a visual graph
- researchrabbit ai
- David Killer Crypto Blog
- Where to use a blockchain in non-financial applications?
- Navigating Privacy on Public Blockchains
- Secure computation: Homomorphic encryption or hardware enclaves?
- BLS12-381 For The Rest Of Us
- zkSNARKs in a nutshell
- A Brief Dive Into zk-SNARKs and the ZoKrates Toolbox on the Ethereum Blockchain
- Quadratic Arithmetic Programs: from Zero to Hero
- HoneyBadgerSwap: Making MPC as a Sidechain
- Decentralized Identity: Passport to Web3
- Demystifying Zero Knowledge Proofs
- What are zk-SNARKs?
- Zero-Knowledge Proofs: STARKs vs SNARKs
- Elliptic Curve Cryptography: a gentle introduction
- Simple Explanations of Arithmetic Circuits and Zero-Knowledge Proofs
- Blockchains, crypto, & web3: Connections, models, more, all episodes
- Web3 is Self-Certifying
- Web5: The Decentralized Web Platform
- What is Web5, Jack Dorsey’s latest idea?
- ZKP— PlonK Algorithm Introduction
- Create your first zero-knowledge snark circuit using circom and snarkjs
- iden3 Blog
- The BBS Signature Scheme
- Anonymous Credential Part 2: Selective Disclosure and CL Signature
- tutorial anoncreds
- Medium: Arthur Hayes
- How To Script An Automatic Token Airdrop for 40k subscribers
- Zero Knowledge in DiDs and Social Networks
- How DECO Enables Undercollateralized DeFi Lending: A Proof of Concept With Teller
- CS294/194-196: Special Topics on Science and Technology of Decentralization and Decentralized Intelligence
- ZK-STARK Theory & Implementation
- Proofs, Arguments, and Zero-Knowledge, PDF, Youtube
- CSN09112 Module, Example file encryption using scrypt and NaCl for the gocrypto book
- ECE/CS 598 AM: Cryptography with Ideal Functionalities
- Einführung in die Kryptographie von Christof Paar
- Decentralized Systems Lab
- Zero-Knowledge Proofs
- Lecture slides Blockchain-based Systems Engineering
- Iden3 Documentation: Publications
- Onur Mutlu: Digital Design and Computer Architecture Spring 2020 (252-0028-00L)
- Onur Mutlu: Lecture Video Playlist on YouTube
- Andrew Miller: ECE498AC/CS498AM: Applied Cryptography, Fall 2019
- Decentralized Systems Lab: Courses
- Christine Parlour, Dawn Song: CS294-177/CS194-177/PHDBA 297T.1/MFE 230T.3: Decentralized Finance
- Intuitive Advanced Cryptography
- A Graduate Course in Applied Cryptography
- IC3 Initiative for Cryptocurrencies and Contracts
- DeFi MOOC
- Bankless
- CryptoClear
- UC Model Youtube: MACS Frontier
- Zero Knowledge
- Grand Amphi Théatre
- ZK Whiteboard Sessions
- Finite Fields in Cryptography: Why and How
- explained-from-first-principles: Number theory
- Elliptic Curve Cryptography (ECC)
- A survey of elliptic curves for proof systems
- The animated elliptic curve
- An Illustrated Guide to Elliptic Curve Cryptography Validation
- Pairings for beginners
- introduction to mathematical cryptography
- Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
- Notes for Lecture 27
- Penumbra Value Commitments
- Efficient Functional Commitments: How to Commit to a Private Function
- Polynomial Commitment with a One-to-Many Prover and Applications
- Commit-Chains: Secure, Scalable Off-Chain Payments
- Lecture 10 Premiere: Privacy on the Blockchain
- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
- An Expressive (Zero-Knowledge) Set Accumulator
Arithmetization is a preliminary process that derives an alternative circuit representation that allows for a more efficient proof computation. In general, the "backend" of a SNARK considers pre-processing and formatting of an arithmetic or boolean circuit. The "frontend" of a SNARK describes the actual proof algorithm, which leverages the intermediate description emitted from the backend to efficiently prove & verify that a prover knows a specific witness that satisfies the circuit at hand. Most proof algorithms make use of pairings, where a specific elliptic curve is leveraged to homomorphically compute circuit satisfiability without disclosing the witness of the prover in plain.
- R1CS & QAP Overview
- R1CS & QAP Implementation Example
- Paper on DIZK that includes a good description of Groth16, R1CS and QAP
- From Zero Knowledge to Bulletproofs
- Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
- SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
- Many-out-of-many Proofs
- Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers
- Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
- Proof of Replication
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- ZoKrates - Scalable Privacy-Preserving Off-Chain Computations
- LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
- Youtube: Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford
- ZKProof Community Reference
- Lecture 5: Proofs of Knowledge, Schnorr’s protocol, NIZK
- Doubly-efficient zkSNARKs without trusted setup
- zkStudyClub: PCD without zkSNARK with Pratyush Mishra (UC Berkeley) & Benedikt Bünz (Stanford)
- Designated Verifier Proofs and Their Applications
- Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
- PlonK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
- Darlin: Recursive proofs using Marlin
- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes
- Group Signatures: Authentication with Privacy
- Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
- Decentralized Trust Management
- NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging
- Compact Certificates of Collective Knowledge
- CA Authorization Smart Contract Architecture
- On Enforcing the Digital Immunity of a Large Humanitarian Organization
- Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology
- Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
- Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
- Towards Self-sovereign, Decentralized Personal Data Sharing and Identity Management
- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
- Anonymous Credentials Light
- SCPKI: A Smart Contract-based PKI and Identity System
- Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
- With a Little Help from My Friends: Constructing Practical Anonymous Credentials
- Towards Smart Contract-based Verification of Anonymous Credentials
- Exploring Web3 From the View of Blockchain
- zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
- Decentralized Anonymous Credentials
- A note on anonymous credentials using BLS signatures
- Zero-knowledge credentials with deferred revocation checks
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
- Anonymous credentials 2.0
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- A Truly Self-Sovereign Identity System
- SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
- ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi
- Privacy-Preserving Reputation Systems based on Blockchain and other Cryptographic Building Blocks: A Survey
- A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation
- Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks
- Chainlink Off-chain Reporting Protocol
- Town Crier: An Authenticated Data Feed for Smart Contracts
- DECO: Liberating Web Data Using Decentralized Oracles for TLS
- Practical Decentralized Oracle Contracts for Cryptocurrencies
- Discreet Log Contracts
- Youtube: Fan Zhang- "Connection Blockchains to the Real World"
- CHORUS: a Programming Framework for Building Scalable Differential Privacy Mechanisms
- Non-Interactive Differentially Anonymous Router
- Differential Privacy for Directional Data
- GUPT: Privacy Preserving Data Analysis Made Easy
- The Algorithmic Foundations of Differential Privacy
- The Composition Theorem for Differential Privacy
- Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
- Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
- Lightweight techniques for private heavy hitters
- Some Remarks and Ideas About Monetization of Sensitive Data
- On the Tradeoff Between Privacy and Utility in Data Publishing
- Empirical privacy and empirical utility of anonymized data
- Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure
- Secure Multi-party Differential Privacy
- Secure Multiparty Computation for Privacy-Preserving Data Mining
- Differential Privacy Under Fire
- Private Record Matching Using Differential Privacy
- Detecting Violations of Differential Privacy
- Verifiable Differential Privacy
- DPGen: Automated Program Synthesis for Differential Privacy
- LightDP: Towards Automating Differential Privacy Proofs
- εktelo: A Framework for Defining Differentially-Private Computations
- Approximate Span Liftings
- Differentially Private Bayesian Programming
- SAC: A System for Big Data Lineage Tracking
- Capturing and Querying Fine-grained Provenance of Preprocessing Pipelines in Data Science
- Data quality: “Garbage in – garbage out”
- Heterogeneous Private Information Retrieval
- Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach
- MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
- A Tale of Two Trees: One Writes, and Other Reads
- Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution
- Towards Contractual Agreements for Revocation of Online Data
- CALYPSO: Private Data Management for Decentralized Ledgers
- Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
- Witness Encryption and its Applications
- LedgerView: Access-Control Views on Hyperledger Fabric
- WAVE: A Decentralized Authorization Framework with Transitive Delegation
- Decentralizing Privacy: Using Blockchain to Protect Personal Data
- Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
- Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
- OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
- Building a Secure Data Market on Blockchain, Youtube
- Zeph: Cryptographic Enforcement of End-to-End Data Privacy
- A Demonstration of Sterling: A Privacy-Preserving Data Marketplace
- Towards Building a Responsible Data Economy (Dawn Song, UC Berkeley), Youtube
- Federated Authorization over Access to Personal Data for Decentralized Identity Management
- FileBounty: Fair Data Exchange
- Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
- Towards Blockchain-based Auditable Storage and Sharing of IoT Data
- Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
- NFTs for Art and Collectables: Primer and Outlook
- IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3)
- Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks
- Secure Untrusted Data Repository (SUNDR)
- DORY: An Encrypted Search System with Distributed Trust
- Verifiable Set Operations over Outsourced Databases
- When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
- vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
- Can a Public Blockchain Keep a Secret?
- CHURP: Dynamic-Committee Proactive Secret Sharing
- Storing and Retrieving Secrets on a Blockchain
- Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
- Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
- Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
- COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
- Smart Contract With Secret Parameters
- Espresso CAP Specification: Configurable Asset Privacy
- Decentralized Cross-Blockchain Asset Transfers
- tbDEX: A Liquidity Protocol v0.1
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol
- Towards Efficient Data Valuation Based on the Shapley Value
- AuthSC: Mind the Gap between Web and Smart Contracts
- User Centricity: A Taxonomy and Open Issues
- Dawn Song (Berkeley)- "Data Sovereignty and Decentralized Data Science"
- User-Managed Access to Web Resources
- Federated Authorization over Access to Personal Data for Decentralized Identity Management
- Bringing Privacy Control back to Citizens
- Metaverse for Social Good: A University Campus Prototype
- Personal Data: The Emergence of a New Asset Class
- Property Rights By Armen A. Alchian
- User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
- Decentralized Society: Finding Web3’s Soul
- Cryptoeconomic Security for Data Availability Committees
- Balance: Dynamic Adjustment of Cryptocurrency Deposits
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
- VERI-ZEXE: Decentralized Private Computation with Universal Setup
- On-Chain Fully Homomorphic Encryption: smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
- Zexe: Enabling Decentralized Private Computation
- Zexe Youtube
- BUILDING PRACTICAL SYSTEMS THAT COMPUTE ON ENCRYPTED DATA
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
- HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication
- Enigma: Decentralized Computation Platform with Guaranteed Privacy
- Arbitrum: Scalable, private smart contracts
- Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms
- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
- ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
- Piranha: A GPU Platform for Secure Computation
- CLOAK: Enabling Confidential Smart Contract with Multi-party Transactions
- Scalable and Privacy-preserving Off-chain Computations
- Auditable, Available and Resilient Private Computation on the Blockchain via MPC
- Pesca: A Privacy-Enhancing Smart-Contract Architecture
- Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
- zkay: Specifying and Enforcing Data Privacy in Smart Contracts
- Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
- MP-SPDZ: A Versatile Framework for Multi-Party Computation
- Faster Secure Two-Party Computation in the Single-Execution Setting
- Computing on Encrypted Data
- Publicly Auditable MPC-as-a-Service with succinct verification and universal setup
- Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
- Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
- MPC-TP: Fully Linear PCPs and their Cryptographic Applications - Niv Gilboa
- Founding Secure Computation on Blockchains
- SoK: Off The Chain Transactions
- Formalizing Anonymous Blacklisting Systems
- SoK: Privacy-Preserving Computing in the Blockchain Era
- SoK: A Taxonomy of Cryptocurrency Wallets
- SoK: Off The Chain Transactions
- SoK: Certified Robustness for Deep Neural Networks
- SoK: Computer-Aided Cryptography
- SoK: Blockchain Light Clients
- SoK: General Purpose Compilers for Secure Multi-Party Computation
- SoK: TEE-assisted Confidential Smart Contract
- SoK: Differential Privacy as a Causal Property
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust
- SoK: Oracles from the Ground Truth to Market Manipulation
- SoK: Benchmarking Flaws in Systems Security
- Universally Composable Security: A New Paradigm for Cryptographic Protocols
- Security and Composition of Multiparty Cryptographic Protocols
- Security and Composition of Cryptographic Protocols: A tutorial
- iUC: Flexible Universal Composability Made Simple
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Security and composition of cryptographic protocols: a tutorial (part I)
- A Formal Treatment of Hardware Wallets
- On the Usability of Authenticity Checks for Hardware Security Tokens
- What’s in Your Wallet? Privacy and Security Issues in Web 3.0
- Identity Management in IoT Networks Using Blockchain and Smart Contracts
- Smart Contract-Based Access Control for the Internet of Things
- PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts
- LegIoT: Ledgered Trust Management Platform for IoT
- A Minimalist Approach to Formalizing Analog Sensor Security
- SmartDID: A Novel Privacy-preserving Identity based on Blockchain for IoT
- INVITED Things, Trouble, Trust: On Building Trust in IoT Systems
- Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain
- A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
- Zapper: Smart Contracts with Data and Identity Privacy
- Experiences Deploying Multi-Vantage-Point Domain Validation at Let’s Encrypt
- Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- TeSC: TLS/SSL-Certificate Endorsed Smart Contracts
- One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet
- Designing for Tussle in Encrypted DNS
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- Twisted Polynomials and Forgery Attacks on GCM
- GCM Security Bounds Reconsidered
- Message Franking via Committing Authenticated Encryption
- Fast Message Franking: From Invisible Salamanders to Encryptment
- Beyond Birthday Bound Secure MAC in Faulty Nonce Model
- Partitioning Oracle Attacks
- Implementing and Proving the TLS 1.3 Record Layer
- The Illustrated TLS 1.3 Connection
- ROSEN: RObust and SElective Non-repudiation (for TLS), link2
- Decentralized naming and certificate authority
- An ACME-based certificate authority, written in Go
- ENS
- Ethereum Name Service: the Good, the Bad, and the Ugly
- Asecuritysite: DNSSEC
- Atlan: The new way for data-driven teams to discover, understand, trust, and collaborate on data assets
- Promethium: Fast Data Discovery and Governance
- Steem: Powering Communities and Opportunities
- Affinidi: Changing data ownership for good
- Veramo: Performant and modular APIs for Verifiable Data and SSI
- GET protocol: Ticketing is the start of something bigger
- SISMO: The key primitive for web3 identities
- Proof of Interest
- MystenLabs: Enigneering asset ownership
- libocr consists of a Go library and a set of Solidity smart contracts that implement the Chainlink Offchain Reporting Protocol
- This demonstrates how a smart contract on NEAR can access off-chain data via Chainlink's oracle solution.
- The industry leading Web3 API
- The World’s Most Powerful Blockchain Development Suite
- Composable Web3 data network
- Sign-in with Ethereum RFP
- Ceramic Protocol Specification
- Okta
- Golang SSI Framework
- NFT3 | The First Unified Virtual Identity Network for Web3
- The essential web3 toolkit for sharing and funding anything.
- Identity protocol for open applications
- Polygon DID Implementation
- Introducing Polygon ID, Zero-Knowledge Identity for Web3
- EIP-1056: Ethereum Lightweight Identity
- Claim your passport
- decentralized-identity / snark-credentials
- spruceID: Your Keys, Your Data, github
- iden3: Prove your access rights, not your identity
- emmy: Library for zero-knowledge proof based applications (like anonymous credentials
- Starkware STARK 101
- zkSync is a user-centric zk rollup platform from Matter Labs (opens new window). It is a scaling solution for Ethereum, already live on Ethereum mainnet.
- zkSNARK implementation in JavaScript & WASM
- ZoKrates
- arkworks is a Rust ecosystem for zkSNARK programming
- gnark is a fast zk-SNARK library that offers a high-level API to design circuits
- mimblewimble
- zkSNARK library implementation in Go from scratch (compiler, setup, prover, verifier)
- circom and snarkjs
- zkSnark circuit compiler
- zkSNARK implementation in JavaScript & WASM
- Circom circuits used by the iden3 core protocol.
- zkrp package
- Ethereum implementation of the Coconut smart contract library
- MerkleTree compatible with circomlib/sm
- IDEN3: Scalable distributed identity infrastructure using zero-knowledge proofs to guarantee privacy
- Iden3 Documentation: Iden3 Docs
- Circom and SnarkJS
- zkDocs
- Robust MPC-based confidentiality layer for blockchains
- Anonymous Zether: A private payment system for Ethereum-based blockchains, with no trusted setup.
- emp-toolkit
- ABY Developer Guide
- The Confidential Computing Platform for Collaborative Analytics and AI
- Zether: Towards Privacy in a Smart Contract World
Identity Data Computation Projects (pay attention on legitimacy, verify on your own by checking docs)
- Hyperledger CL Credentials
- Hyperledger BBS+ Credentials, PDF Title: Anonymous credentials 2.0
- Veramo, docs, specs
- SpruceID, docs, cryptoscript
- iden3, docs
- Mattr, docs, learn
- Trinsic, docs
- Lukso, docs
- Ceramic, docs
- Ocean Protocol, docs
- Secret Network, docs
- Oasis Labs, docs
- iExec, docs
- Sia
- Kepler, docs
- Storj, paper
- Filecoin, paper
- Gitcoin Passport
- Sismo
- brightID, docs
- civic, docs
- Decentralized Identity Foundation, docs
- ShoCard, docs
- Phala, docs
- iDX, docs
- Serto, docs
- Go Ethereum Development
- ether.js: Complete Ethereum library and wallet implementation in JavaScript
- ethr-did-resolver: DID resolver for Ethereum Addresses with support for key management
- go ethereum client
- SIGN-IN WITH ETHEREUM
- openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development.
- How To Use AccessControl.sol
- Role Based Access Control for the Ethereum Blockchain
- Creating Zero knowledge Proofs with ZoKrates
- CESC: Crypto Economics Security Conference
- ICBC: IEEE International Conference on Blockchain and Cryptocurrency
- CAAW: 1st International Workshop on Cryptoasset Analytics
- Cryptography Conferences
- IEEE-Security
- Security and Privacy Conference Deadlines
- Usenix Security Symposium
- Eurocrypt
- Crypto
- S&P: IEEE Symposium on Security and Privacy
- NDSS Symposium
- Security Conference Ranking
- CCS (sigsag): ACM Conference on Computer and Communications Security
- Dawn Song
- Andrew Miller
- Thomas Ristenpart
- Dan Boneh
- Bryan Ford
- Clementine Gritti
- Andrew Paverd
- Robert Drost, Ph.D.
- Vitalik Buterin
- Dahlia Malkhi
- Pratyush Mishra
- E. Glen Weyl
- Asset management for a DeFi world
- Institutional crypto-capital network
- Data DAO part 1 DataDAO introduction
- Tezos: A blockchain designed to evolve.
- Web 5: TBD
- Ocean: On-ramp and off-ramp for data assets into DeFi
- IC3 Newsletter.
- rekt
- Decentralized Systems Lab
- YCombinator: Hacker News
- Gitcoin Grants
- Encrypted Data Vaults 0.1
- Decentralized Identifier Resolution (DID Resolution) v0.2
- A Primer for Decentralized Identifiers
- Verifiable Credentials Data Model v1.1
- 3ID DID Method Specification
- ERC1238: Non-transferrable Non-Fungible Tokens (NTT)
- EIP-721: Non-Fungible Token Standard
- ERC-725 - Ethereum Identity Standard
- ERC-735: Claim Holder #735
- EIP-1155: Multi Token Standard
- EIP-1462: Base Security Token
- EIP-1056: Ethereum Lightweight Identity
- Ethereum Improvement Proposals
- Blockchain Identity