1.
Intro
2.
Usage
2.1.
Quickstart
2.2.
Guests and hosts
2.2.1.
Guests
2.2.2.
Hosts
2.3.
Profiling
2.3.1.
zkVM profiling
2.3.2.
Guest profiling
2.4.
Troubleshooting
3.
How it works
3.1.
Architecture overview
3.1.1.
RISC-V emulation
3.1.2.
R1CS constraints
3.1.2.1.
Spartan
3.1.3.
Registers
3.1.4.
RAM
3.1.5.
Instruction execution
3.1.6.
Bytecode
3.1.7.
Batched opening proof
3.2.
Twist and Shout
3.3.
Dory
3.4.
Optimizations
3.4.1.
Batched sumcheck
3.4.2.
Batched openings
3.4.3.
Inlines
3.4.4.
Small value optimizations
3.4.5.
EQ optimizations
3.5.
Appendix
3.5.1.
Terminology and nomenclature
3.5.2.
Multilinear extensions
3.5.3.
Sumcheck
3.5.4.
Polynomial commitment schemes
3.5.5.
Memory checking and lookup arguments
3.5.6.
RISC-V
3.5.7.
Jolt 0.1.0
3.5.8.
Additional resources
4.
Roadmap
4.1.
64-bit RISC-V (RV64)
4.2.
Streaming
4.3.
Recursion
4.4.
Known optimizations
4.5.
Zero Knowledge
4.6.
On-chain verifier (no recursion/composition)
4.7.
Precompiles
Light (default)
Rust
Coal
Navy
Ayu
JoltBook
Appendix
This section includes supplementary background relevant to Jolt.
Terminology and nomenclature
Multilinear extensions
Sumcheck
Polynomial commitment schemes
Memory checking and lookup arguments
RISC-V
Jolt 0.1.0
Additional resources