<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 13:56:36 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Zero Knowledge Proofs”</title>
    <link>https://cryptography.fireside.fm/tags/zero-knowledge%20proofs</link>
    <pubDate>Sun, 14 Mar 2021 13:00:00 +0100</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 13: Zero-Knowledge STARKs in the Real World!</title>
  <link>https://cryptography.fireside.fm/13</link>
  <guid isPermaLink="false">5d679e54-9e7b-4018-bbbf-19b62a834439</guid>
  <pubDate>Sun, 14 Mar 2021 13:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/5d679e54-9e7b-4018-bbbf-19b62a834439.mp3" length="56417091" type="audio/mpeg"/>
  <itunes:episode>13</itunes:episode>
  <itunes:title>Episode 13: Zero-Knowledge STARKs in the Real World!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.</itunes:subtitle>
  <itunes:duration>47:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.
Links and papers discussed in the show:
* Scalable, transparent, and post-quantum secure computational integrity (https://eprint.iacr.org/2018/046.pdf)
* Cairo Language (https://www.cairo-lang.org)
* Cairo Workshop, 14-15 March 2021! (https://www.eventbrite.com/e/cairo-101-workshop-i-tickets-142918738795)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Eli Ben-Sasson.
</description>
  <itunes:keywords>zero-knowledge proofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2018/046.pdf" rel="nofollow">Scalable, transparent, and post-quantum secure computational integrity</a></li>
<li><a href="https://www.cairo-lang.org" rel="nofollow">Cairo Language</a></li>
<li><a href="https://www.eventbrite.com/e/cairo-101-workshop-i-tickets-142918738795" rel="nofollow">Cairo Workshop, 14-15 March 2021!</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Eli Ben-Sasson.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="Scalable, transparent, and post-quantum secure computational integrity" rel="nofollow" href="https://eprint.iacr.org/2018/046.pdf">Scalable, transparent, and post-quantum secure computational integrity</a></li><li><a title="Cairo Language" rel="nofollow" href="https://www.cairo-lang.org">Cairo Language</a></li><li><a title="Cairo Workshop, 14-15 March 2021!" rel="nofollow" href="https://www.eventbrite.com/e/cairo-101-workshop-i-tickets-142918738795">Cairo Workshop, 14-15 March 2021!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2018/046.pdf" rel="nofollow">Scalable, transparent, and post-quantum secure computational integrity</a></li>
<li><a href="https://www.cairo-lang.org" rel="nofollow">Cairo Language</a></li>
<li><a href="https://www.eventbrite.com/e/cairo-101-workshop-i-tickets-142918738795" rel="nofollow">Cairo Workshop, 14-15 March 2021!</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Eli Ben-Sasson.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="Scalable, transparent, and post-quantum secure computational integrity" rel="nofollow" href="https://eprint.iacr.org/2018/046.pdf">Scalable, transparent, and post-quantum secure computational integrity</a></li><li><a title="Cairo Language" rel="nofollow" href="https://www.cairo-lang.org">Cairo Language</a></li><li><a title="Cairo Workshop, 14-15 March 2021!" rel="nofollow" href="https://www.eventbrite.com/e/cairo-101-workshop-i-tickets-142918738795">Cairo Workshop, 14-15 March 2021!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!</title>
  <link>https://cryptography.fireside.fm/6</link>
  <guid isPermaLink="false">aae91f49-12af-4049-9467-e43107dcd555</guid>
  <pubDate>Tue, 03 Nov 2020 16:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/aae91f49-12af-4049-9467-e43107dcd555.mp3" length="59671475" type="audio/mpeg"/>
  <itunes:episode>6</itunes:episode>
  <itunes:title>Episode 6: Proving the Existence of Vulnerabilities With Zero-Knowledge Proofs!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Dr. David Archer of Galois discusses using zero-knowledge proof in order to prove the existence (or lack of) a software vulnerability without sharing details about the vulnerability itself.</itunes:subtitle>
  <itunes:duration>41:26</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.
But what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!
That’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.
Links and papers discussed in the show:
* Galois Fromager (https://galois.com/project/fromager/)
* Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions (https://arxiv.org/abs/1909.13403)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: David Archer.
</description>
  <itunes:keywords>zero-knowledge proofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.</p>

<p>But what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!</p>

<p>That’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://galois.com/project/fromager/" rel="nofollow">Galois Fromager</a></li>
<li><a href="https://arxiv.org/abs/1909.13403" rel="nofollow">Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: David Archer.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Zero-knowledge proofs have been a notorious research target ever since Zcash and other cryptocurrencies have invented lots of new use cases for them. Range proofs, bullet proofs, you name it – all kinds of zero-knowledge mechanisms have received more and more attention.</p>

<p>But what about using zero-knowledge proofs to prove the existence of a software vulnerability? That way, you can prove that you have a zero-day without risking it getting stolen, putting both vulnerability researchers as well as companies looking to secure their software in a better position!</p>

<p>That’s what Dr. David Archer from Galois is working on, and he joins me today on Cryptography FM to discuss this new interesting use case, and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://galois.com/project/fromager/" rel="nofollow">Galois Fromager</a></li>
<li><a href="https://arxiv.org/abs/1909.13403" rel="nofollow">Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: David Archer.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
