security.md
π 0.01%
Dimensions
hemera/docs/explanation/security
ecosystem context Poseidon2 deployment landscape | System | Field | t | R_F | R_P | Capacity | Status | |---|---|---|---|---|---|---| | Plonky3 | Goldilocks | 12 | 8 | 22 | 4 (128-bit) | Production | | SP1 | BabyBear | 16 | 8 | 13 | 8 (124-bit) | Production | | RISC Zero | BabyBear | 16 | 8 | 13 |…
zheng/docs/explanation/security
security properties the security of zheng reduces to a single assumption: the collision resistance of hemera. every proof, every verification, every recursive composition — all of it rests on the hardness of finding two distinct inputs that produce the same hemera digest. if hemera is secure, zheng…
cyber/security
nox security security properties and formal guarantees of nox security bounds attack surface formal properties Turing completeness Theorem: nox is Turing-complete. Proof: Construct encoding of arbitrary Turing machine M via patterns 0-4, 9. ∎ confluence Theorem: nox is confluent. Proof: Orthogonal…
Linked References
- aos/sphere
- bip-39 wordlist
- cyber/context/distribution/128k
- cyber/context/distribution/1400k
- cyber/context/distribution/200k
- cyber/context/distribution/32k
- cyber/context/distribution/500k
- cyber/context/distribution/900k
- cyber/tokens/consensus token
- double signing attack
- hemera/docs/explanation
- honest majority assumption
- index
- validators