1. 1. Intro
  2. 2. Usage
    1. 2.1. Quickstart
    2. 2.2. Guests and hosts
      1. 2.2.1. Guests
      2. 2.2.2. Hosts
    3. 2.3. Profiling
      1. 2.3.1. zkVM profiling
      2. 2.3.2. Guest profiling
    4. 2.4. Troubleshooting
  3. 3. How it works
    1. 3.1. Architecture overview
      1. 3.1.1. RISC-V emulation
      2. 3.1.2. R1CS constraints
        1. 3.1.2.1. Spartan
      3. 3.1.3. Registers
      4. 3.1.4. RAM
      5. 3.1.5. Instruction execution
      6. 3.1.6. Bytecode
      7. 3.1.7. Batched opening proof
    2. 3.2. Twist and Shout
    3. 3.3. Dory
    4. 3.4. Optimizations
      1. 3.4.1. Batched sumcheck
      2. 3.4.2. Batched openings
      3. 3.4.3. Inlines
      4. 3.4.4. Small value optimizations
      5. 3.4.5. EQ optimizations
    5. 3.5. Appendix
      1. 3.5.1. Terminology and nomenclature
      2. 3.5.2. Multilinear extensions
      3. 3.5.3. Sumcheck
      4. 3.5.4. Polynomial commitment schemes
      5. 3.5.5. Memory checking and lookup arguments
      6. 3.5.6. RISC-V
      7. 3.5.7. Jolt 0.1.0
      8. 3.5.8. Additional resources
  4. 4. Roadmap
    1. 4.1. 64-bit RISC-V (RV64)
    2. 4.2. Streaming
    3. 4.3. Recursion
    4. 4.4. Known optimizations
    5. 4.5. Zero Knowledge
    6. 4.6. On-chain verifier (no recursion/composition)
    7. 4.7. Precompiles

JoltBook

Appendix

This section includes supplementary background relevant to Jolt.

  • Terminology and nomenclature
  • Multilinear extensions
  • Sumcheck
  • Polynomial commitment schemes
  • Memory checking and lookup arguments
  • RISC-V
  • Jolt 0.1.0
  • Additional resources