Devcon Archive logo
Devcon Forum Blog
  • Watch
  • Event
    Event: background logo
    • Devcon 7
    • Devcon 6
    • Devcon 5
    • Devcon 4
    • Devcon 3
    • Devcon 2
    • Devcon 1
    • Devcon 0
  • Categories
    Categories: background logo
    • Cryptoeconomics
    • Devcon
    • Developer Experience
    • Coordination
    • Core Protocol
    • Layer 2s
    • Real World Ethereum
    • Cypherpunk & Privacy
    • Security
    • Applied Cryptography
    • Usability
  • Playlists

Suggested

Loading results..

View all

About Devcon —

Devcon is the Ethereum conference for developers, researchers, thinkers, and makers.

An intensive introduction for new Ethereum explorers, a global family reunion for those already a part of our ecosystem, and a source of energy and creativity for all.

  • Watch
  • Devcon
  • Forum
  • Blog

Get in touch

devcon@ethereum.org

Subscribe to our newsletter

Crafted with passion ❤️ at the Ethereum Foundation

© 2025 — Ethereum Foundation. All Rights Reserved.

devcon 7 / programmable cryptography from a software engineering lens

  • YouTube
  • Details

Programmable Cryptography from a Software Engineering Lens

Duration: 00:00:00

Speaker: Aayush Gupta, Ahmad, arnaucube, Justin Glibert, Kevin Kwok

Type: Workshop

Expertise: Intermediate

Event: Devcon

Date: Nov 2024

Different cryptographic primitives have different affordances, especially when using them in practice, and especially together. In this session, we explore a new way of interacting with PCs at a software engineering level via a LISP like programming language. This language enables creating self-verifying graphs of computation.

Categories

Cryptography
  • Related
Keynote: The Universal Cryptographic Adapter preview
Devcon
Talk
19:46

Keynote: The Universal Cryptographic Adapter

The "secret" third affordance of Zero-Knowledge proof after 1) Privacy and 2) Succinctness is Interoperability. ZK enables us to continuously refactor data, aggregate it from different sources, and transforming it without loosing its integrity. Starting with the Zupass project, and now with the broader adoption of the POD and GPC format, 0xPARC has been exploring using ZK for data sovereignty and creating more interoperable data ecosystem. We will cover our learnings and progress in this talk.

[CLS] Programmable Cryptography preview
Devcon
Mixed Formats
1:37:35

[CLS] Programmable Cryptography

The Programmable Cryptography CLS hosts a series of talks exploring how advanced cryptography can reshape digital infrastructure beyond blockchain and trust infrastructure. SCHEDULE: 10:00–10:20 AM, Justin Glibert / 10:20–10:45 AM, Vitalik Buterin / 10:45–11:10 AM, Albert Ni / 11:10–11:35 AM, Barry Whitehat / 11:35 AM–12:00 PM gubsheep

Programmable Cryptography and the future of the Internet preview
Devcon
Talk
25:25

Programmable Cryptography and the future of the Internet

You rarely hear of issues at the networking layer of the Internet: networking companies are running utilities business: they are fungible and can be swapped if distrusted. Most of the value captured on the Internet -- and also most abuse -- happen at the Compute and Data layer of the Web. Ethereum gave us a glimpse of a fundamentally different architecture for Compute and Data than Client/Server architecture.We think the Internet is 1/3 complete, and that programmable cryptography can finish it.

Non-interactive, Unique Nullifiers: The Key to The Next Era of ZK preview
Devcon
Talk
23:10

Non-interactive, Unique Nullifiers: The Key to The Next Era of ZK

ZK app systems are being held back because there isn't an anonymous way to prove that you aren't double claiming/double posting. In this talk, we explore the variety of nullifiers and present a new signature scheme that would enable things like zk airdrops or other zk systems that require uniqueness.

A Deep Dive into ZK Proofs of PODs preview
Devcon
Workshop
1:12:50

A Deep Dive into ZK Proofs of PODs

Provable Object Data (POD) is a format any app to easily sign data and make ZK proofs without manual circuit writing or trusted setup. Proofs are described in a simple configuration language, then compiled to a family of General Purpose Circuits (GPCs). POD tech is used in Zupass and available as open-source libraries. We’ll dive into the cryptography behind PODs, and what makes them suited to ZK proofs. We’ll also cover the modular design which makes GPC circuits highly configurable.

Developing and using a modular folding schemes library preview
Devcon
Talk
26:14

Developing and using a modular folding schemes library

We will present Sonobe, a modular folding-schemes library. It currently features implementations of Nova, CycleFold, Hypernova and ProtoGalaxy schemes and is compatible with a wide range of R1CS arithmetization libraries. we will briefly discuss what folding schemes are and how they fit into IVC-style proof systems. Next, we will explain how Sonobe was built and what features it supports. Finally, we will cover what has been built with Sonobe and how developers can start using it today.

ZK Email: Fast Proofs and Production-Ready Account Recovery preview
Devcon
Talk
25:18

ZK Email: Fast Proofs and Production-Ready Account Recovery

We discuss progress that ZK Email has made in making new proofs really easily, as well as interesting new on-chain directions for email-triggered transactions. We'll go over proof registries, email-based multisig signers, and email guardians for account recovery in production.

zkemail: Decentralized ID Verification on Chain Without Servers preview
Devcon
Talk
17:10

zkemail: Decentralized ID Verification on Chain Without Servers

We demo zk-email, a new primitive that lets you verify emails trustlessly. We demo a simple trustless Twitter badge on chain, and show how almost any data in web2 can be turned into trustless badges or zk badges on a blockchain. Launching with Personae Labs!

Indistinguishability Obfuscation (iO) preview
Devcon
Workshop

Indistinguishability Obfuscation (iO)

There has been a lot of recent progress and interest in iO (Indistinguishability Obfuscation). This session will cover topics from the basics to theory and attempts at practical implementations—plus ways of breaking these attempts.

Multi-Party Fully Homomorphic Encryption (MP-FHE) in Practice preview
Devcon
Workshop
1:23:49

Multi-Party Fully Homomorphic Encryption (MP-FHE) in Practice

In this session, we will break down the FHE game Frogzone, which required advancements at every layer of the cryptographic software stack: cryptography libraries and tooling, circuits, software infrastructure, and even DevOps. We will also cover additional use cases for FHE at a technical level.