# References

- [1] E. Ben-Sasson, A. Chiesa, C. Garman, Green, I. Miers, E. Tromer and M. Virza (2014), Zerocash: decentralized anonymous payments from Bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP ’14, pp. 459–474. External Links: Link.

- [2] E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer and M. Virza (2013), SNARKs for C: verifying program executions succinctly and in zero knowledge (extended version). Note: Cryptology ePrint Archive, Report 2013/507. External Links: Link.

- [3] E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer and M. Virza (2013), SNARKs for C: verifying program executions succinctly and in zero knowledge. In Proceedings of the 33rd Annual International Cryptology Conference, CRYPTO ’13, pp. 90–108.

- [4] E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer and M. Virza (2013), SNARKs for C: verifying program executions succinctly and in zero knowledge. In CRYPTO ’13, pp. 90–108. Note: Extended version: [2].

- [5] E. Ben-Sasson, A. Chiesa, E. Tromer and M. Virza (2014), Succinct non-interactive zero knowledge for a von Neumann architecture. In USENIX Security 2014, pp. 781–796. External Links: Link.

- [6] N. Bitansky, R. Canetti, A. Chiesa, S. Goldwasser, H. Lin, A. Rubinstein and E. Tromer, The hunting of the SNARK. Journal of Cryptology. Note: to appear. External Links: Link.

- [7] (2016) BIU winter school: cryptography in the cloud — verifiable computation and special encryption. Note: workshop (with video recording). External Links: Link.

- [8] V. Buterin (2017), zk-SNARKs: under the hood. Note: blog posts. External Links: Link.

- [9] A. Gabizon (2017), Explaining snarks (parts i through vii). Note: blog posts. External Links: Link.

- [10] R. Gennaro, C. Gentry, B. Parno and M. Raykova (2013), Quadratic span programs and succinct NIZKs without PCPs. In EUROCRYPT ’13, pp. 626–645. External Links: Link.

- [11] S. Goldwasser, S. Micali and C. Rackoff (1985), The knowledge complexity of interactive proof-systems. In STOC 1985, pp. 291–304. External Links: Link.

- [12] M. Green (2014), Zero knowledge proofs: an illustrated primer. Note: blog post. External Links: Link.

- [13] M. Naor, Y. Naor and O. Reingold (1999), Applied kid cryptography or how to convince your children you are not cheating. In Eurocrypt ’94, pp. 1–12.

- [14] M. Naor(Website). External Links: Link.

- [15] B. Parno, J. Howell, C. Gentry and M. Raykova (2013), Pinocchio: nearly practical verifiable computation. In IEEE Symposium on Security and Privacy, pp. 238–252. External Links: Link.

- [16] C. Reitwiessner (2016), zkSNARKs in a nutshell. Note: blog post. External Links: Link.
- [17] D. Benarroch and A. Zohar (2017), Trustless Computing on Private Data. Note: blog post. External Links: Link.
- [18] (2017) QED-it Meetup, Prove-it, Blockchain-it: ZKP in Action. Note: Tel Aviv Meetup (with video recording). External Links: Link.