-
Notifications
You must be signed in to change notification settings - Fork 7
Open
Description
if my problem is to verify schnorr signature, i will have a sha256 in my constraint system.
after look at the 4bit xor table in the example, i am wondering how large would be for the loopup table for the sha256 circuit?
in fact, i feel that i understand the paper, but i just don't know how to apply it to a real problem. i feel there's a big gap between what the paper says and its application. or maybe my feelings indicate that I don't really understand the paper.
i have googled, but just still not able to close the gap by myself.
i am looking forward to a paper on how to apply plookup on a real example such as sha256.
Jack.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels