Understanding Solidity by Rebuilding the ERC-20 Token Standard
A step-by-step introduction to Solidity through building a simplified ERC-20 token, covering core smart contract concepts and security fundamentals.
ZK Hack - Power Corrupts Puzzle Solution
In this article we implement a Cheon attack to solve the “Power Corrupts” puzzle contributed by Stanford’s Applied Cryptography group. The focus is on the mathematical details of the attack and a full Rust implementation is provided.
Block Authoring in Vara Network
In this article, we will explore how Vara Network’s custom block authoring implementation differs from the native Substrate implementation.
Merkle Trees for Whitelists in JS
In this article, we’ll explore Merkle trees and Merkle proofs, covering how they work, their role in blockchain systems, and how to build them with a focus on both theory and practical examples.
The Smart Contracts of the Ethereum Name Service
This article introduces the Ethereum Name Service to blockchain developers by exploring its core smart contracts.