There are indeed established standards just a few for each area like hashing, authentication, encryption and so on--one of the things I'm staying.
However, the idea that work is almost complete in crypto, and therefore new work is unneeded, is false (and likely an artefact of the order I'm describing). Take for instance this current work on ZK hashes: https://www.zellic.io/blog/algebraic-attacks-on-zk-hash-func...
However, the idea that work is almost complete in crypto, and therefore new work is unneeded, is false (and likely an artefact of the order I'm describing). Take for instance this current work on ZK hashes: https://www.zellic.io/blog/algebraic-attacks-on-zk-hash-func...