零知识证明 zkDaily
ZKP Frontier Tracker 🎯
Sun
02.08
2026
Project avatar
Paper
https://eprint.iacr.org/2026/150
Antoine Bak Poseidon Cryptanalysis

Notes

零知识证明 zkDaily
Q&A Deep Dive 💬
Sun
02.08
2026
beginner
Why do the attacks focus on small-scale or round-reduced Poseidon instances?
Full-parameter Poseidon includes ample security margins. The bounty challenges intentionally use reduced-round or small-field instances to test cryptanalytic techniques, not to break production settings.
answer
intermediate
What role does the resultant play in these algebraic attacks?
Resultants eliminate variables from multivariate polynomial systems, reducing dimensionality. The authors use them to transform Poseidon2 constraints into univariate or low-dimensional equations that are tractable to solve.
answer
expert
What do these results imply about Poseidon's security as a ZK-friendly hash?
The results confirm the intended security margins: attacks only appear under aggressive round reduction. They validate parameter choices and analysis techniques rather than undermining standard Poseidon instances.
answer