You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if my problem is to verify schnorr signature, i will have a sha256 in my constraint system.
after look at the 4bit xor table in the example, i am wondering how large would be for the loopup table for the sha256 circuit?
in fact, i feel that i understand the paper, but i just don't know how to apply it to a real problem. i feel there's a big gap between what the paper says and its application. or maybe my feelings indicate that I don't really understand the paper.
i have googled, but just still not able to close the gap by myself.
i am looking forward to a paper on how to apply plookup on a real example such as sha256.
Jack.
The text was updated successfully, but these errors were encountered:
if my problem is to verify schnorr signature, i will have a sha256 in my constraint system.
after look at the 4bit xor table in the example, i am wondering how large would be for the loopup table for the sha256 circuit?
in fact, i feel that i understand the paper, but i just don't know how to apply it to a real problem. i feel there's a big gap between what the paper says and its application. or maybe my feelings indicate that I don't really understand the paper.
i have googled, but just still not able to close the gap by myself.
i am looking forward to a paper on how to apply plookup on a real example such as sha256.
Jack.
The text was updated successfully, but these errors were encountered: