Command Palette
Search for a command to run...
Archive
All Articles
Explore our research, engineering insights, and protocol announcements.
66C 5C0 79A613D8FD 03FB302E 5F5A 3284 3A607C7
Learn how Xythum derives cryptographic keys from a single root secret, separating spending, viewing, and shielding capabilities for maximum security.
41909B20 4B86AB FABF5 47A 367B5
Understand the two types of shielded assets in Xythum—Notes for personal balance management and Memos for programmable payments.
8B B9A408018 19E04EAB 4DF5D6E63 7F3 B310EA87
A technical walkthrough of the zero-knowledge circuits that power Xythum's shielded transactions—from entry to exit.
The Mathematics of Private Notes
A deep dive into Xythum's cryptographic note structure — the shielded UTXOs that power private trading on public blockchains.
Threshold Encryption and the Future of Decentralized Compliance
Exploring how threshold cryptography enables selective disclosure for regulatory compliance without compromising user privacy.
F 00D1DD 83 1316F9154 186 AC69 24B6B3F068
Understand zero-knowledge succinct non-interactive arguments of knowledge and how they enable private computation on public blockchains.