Sin7Y's Thoughts on Removing Memory Constraints in the ZKEVMby@sin7y
334 reads

Sin7Y's Thoughts on Removing Memory Constraints in the ZKEVM

tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

It is well known that ZK has great application prospect in the field of computing compression. No matter how complex the original computation is, the verification process is very efficient, which is fundamental to all zk algorithms. Therefore, ZK works well for computational parts of VM execution (such as contract logic, hash calculation, etc.). In the process of VM execution, in addition to the computing itself, there are also some memory access operations. We need to place some data in the memory in advance, and then pull it out when the computation is performed.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Sin7Y's Thoughts on Removing Memory Constraints in the ZKEVM
Sin7Y HackerNoon profile picture

@sin7y

Sin7Y

Credibility

react to story with heart
Sin7Y HackerNoon profile picture
by Sin7Y @sin7y.Sin7Y is a tech team that explores layer 2, cross-chain, ZK, and privacy computing. #WHAT IS HAPPENING IN BLOCKCHAIN#
Read my stories

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa