1. 1. Intro
  2. 2. Usage
    1. 2.1. Quickstart
    2. 2.2. Guests and hosts
      1. 2.2.1. Guests
      2. 2.2.2. Hosts
    3. 2.3. Profiling
      1. 2.3.1. zkVM profiling
      2. 2.3.2. Guest profiling
    4. 2.4. Troubleshooting
  3. 3. How it works
    1. 3.1. Architecture overview
      1. 3.1.1. RISC-V emulation
      2. 3.1.2. R1CS constraints
        1. 3.1.2.1. Spartan
      3. 3.1.3. Registers
      4. 3.1.4. RAM
      5. 3.1.5. Instruction execution
      6. 3.1.6. Bytecode
      7. 3.1.7. Batched opening proof
    2. 3.2. Twist and Shout
    3. 3.3. Dory
    4. 3.4. Optimizations
      1. 3.4.1. Batched sumcheck
      2. 3.4.2. Batched openings
      3. 3.4.3. Inlines
      4. 3.4.4. Small value optimizations
      5. 3.4.5. EQ optimizations
    5. 3.5. Appendix
      1. 3.5.1. Terminology and nomenclature
      2. 3.5.2. Multilinear extensions
      3. 3.5.3. Sumcheck
      4. 3.5.4. Polynomial commitment schemes
      5. 3.5.5. Memory checking and lookup arguments
      6. 3.5.6. RISC-V
      7. 3.5.7. Jolt 0.1.0
      8. 3.5.8. Additional resources
  4. 4. Roadmap
    1. 4.1. 64-bit RISC-V (RV64)
    2. 4.2. Streaming
    3. 4.3. Recursion
    4. 4.4. Known optimizations
    5. 4.5. Zero Knowledge
    6. 4.6. On-chain verifier (no recursion/composition)
    7. 4.7. Precompiles

JoltBook

Usage

  • Quickstart
  • Guests and hosts
    • Guests
    • Hosts
  • Standard Library
  • Profiling
    • zkVM profiling
    • Guest profiling
  • Troubleshooting