Scope

three-address-code-(3ac), protocol-integration, collaborative-snarks, mpc, compilation, consensus, service-commitments, zero-knowledge-proofs, compilers, combinators, geb, multiparty-computation, automation, distributed-systems, semantics-of-pl, anoma-resource-machine, homomorphic-encryption, functional-programming, learner-graph, airscript, automated-reasoning, anoma-applications, programmable-settlement-architectures, protocol-design, constraint-satisfaction, dynamic-modal-logic, cross-chain, intermediate-representations, intents, coding-theory, cairo, privacy-preserving-computation, searchable-encryption, starknet, distributed-algorithm, network-management, category-theory, system-architecture, witness-encryption, machine-learning, proposals, state-machine, vampir, resource-machine, resource-model, interoperability, juvix, counterparty-discovery, storage, private-solving, blockchain-technology, mechanism-design, zkvm, heterogeneous-paxos, arithmetic-circuits, intent-machine, poseidon, surveys, normalisation, user-intentions, big-step-operational-semantics, rank-1-constraint-system-(r1cs), nock, intent-centricity-and-homogeneous-architecture, functional-encryption, zkp, typhon, virtual-machines, vamp-ir, language-specification, heterogeneous-protocols, controllers, hydra, full-stack-decentralised-applications, heterogeneous-trust, formal-logic, trusted-execution-environment, anoma, lambda-calculus, execution

Anoma Research Topics encompasses a wide array of topics and disciplines, including but not limited to:

  • Distributed Systems and Blockchain: Topics such as consensus protocols, P2P architectures, information flow control, vertical & horizontal scalability, heterogeneous trust, and privacy-preserving protocols fall under this category.

  • Cryptography: This category includes areas like zero-knowledge proofs, hash functions, distributed key generation protocols, public-key infrastructure, data encryption, digital signatures, commitment schemes, witness encryption, homomorphic encryption, and other cryptographic protocols.

  • Compilers and Formal Methods: This includes research on type systems and functional programming, implementation of programming languages, formalization of blockchain systems, and optimization processes that help convert high-level code into efficient arithmetic circuits usable with ZK proof systems.

  • Research Logistics: This category includes the workflows, reproducibility, and documentation that underpin effective research practices.

We also encourage submissions that shed light on the Anoma protocol's inner workings and its ecosystem's broader aspects regardless of whether they introduce new techniques. If your research touches upon the design, implementation, or dissemination of technologies related to Anoma, we want to hear from you. If you want expeditious feedback on an idea that could be a research topic, please don't hesitate to make a post on the research forums.