Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry.
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry.

Subscribe to Sin7Y

Subscribe to Sin7Y
<100 subscribers
<100 subscribers

Sin7Y Tech Review (28): Specification for Marlin
Details of this review can be found in Sin7Y’s HackMD channel. About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, autonomous payment solutions, etc. And you can find us here: GitHub | Twitter | Telegram | Medium | Mirror | HackMD | HackerNoon
Sin7Y Tech Review (24): The Stark Proof System of Miden V1
Miden is a stark technology-based ZKVM implementation solution. In its basic layer, the stark proof is generated based on the ZKP library and the proof will be verified.* Details of this review can be found in Sin7Y’s HackMD channel.* About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, a...

Sin7Y Tech Review (28): Specification for Marlin
Details of this review can be found in Sin7Y’s HackMD channel. About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, autonomous payment solutions, etc. And you can find us here: GitHub | Twitter | Telegram | Medium | Mirror | HackMD | HackerNoon
Sin7Y Tech Review (24): The Stark Proof System of Miden V1
Miden is a stark technology-based ZKVM implementation solution. In its basic layer, the stark proof is generated based on the ZKP library and the proof will be verified.* Details of this review can be found in Sin7Y’s HackMD channel.* About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, a...
Share Dialog
Share Dialog

In the previous article, we discussed using halo2 for circuit development. This article will illustrate what we need to pay attention to when developing circuits. When writing this article, we referred to the halo2 code, version f9b3ff2aef09a5a3cb5489d0e7e747e9523d2e6e. Before we begin, let’s review the most critical content, namely the circuit definition.
The halo2 circuit development consists of two critical functions: configure and synthesize. The former establishes the gate and defines the constraints, whereas the latter assigns witness and public data to the constraints.In this article, we’ll take a closer look at what happens in detail during circuit development.
Details of this article can be found in Sin7Y’s HackMD channel.
About Sin7Y
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry. Powered by top-notch blockchain developers, Sin7Y analyzes the most cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, and autonomous payment solutions, etc.
Follow Us
Twitter: https://twitter.com/Sin7Y_Labs
Medium: http://medium.com/@sin7y

In the previous article, we discussed using halo2 for circuit development. This article will illustrate what we need to pay attention to when developing circuits. When writing this article, we referred to the halo2 code, version f9b3ff2aef09a5a3cb5489d0e7e747e9523d2e6e. Before we begin, let’s review the most critical content, namely the circuit definition.
The halo2 circuit development consists of two critical functions: configure and synthesize. The former establishes the gate and defines the constraints, whereas the latter assigns witness and public data to the constraints.In this article, we’ll take a closer look at what happens in detail during circuit development.
Details of this article can be found in Sin7Y’s HackMD channel.
About Sin7Y
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry. Powered by top-notch blockchain developers, Sin7Y analyzes the most cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, and autonomous payment solutions, etc.
Follow Us
Twitter: https://twitter.com/Sin7Y_Labs
Medium: http://medium.com/@sin7y
No activity yet