Profile banner
Jim Miller

Jim Miller

Cryptography Engineering Director at Trail of Bits

New York, New York, United States
Joined May 2025

Network

601 connections
⛓️
Blockchain Security Leaders
🔐
Applied Cryptography Experts
🎓
Security Research Academia
🛡️
Cybersecurity Consultants
💻
Trail of Bits Core
📊
Project Program Managers
⚖️
Legal Compliance Tech

Summary

Jim Miller is a leading expert and engineering director in cryptography, with a strong focus on secure engineering practices and the practical application of advanced cryptographic concepts. He has led numerous security reviews and contributed to critical projects like ZKDocs and PrivacyRaven, demonstrating a deep commitment to fortifying software against complex threats. apple+1
His expertise extends to cutting-edge areas such as zero-knowledge proofs, lattice-based cryptography, multi-party computation (MPC), and post-quantum cryptography. Miller has identified and disclosed significant vulnerabilities in various cryptographic implementations, contributing to the broader security community's understanding and defense against advanced attacks. apple+2
As a thought leader, Jim actively participates in and contributes to the open-source security community, providing insights and advocating for the secure adoption of privacy-enhancing technologies. He is quoted in industry press releases and presents on critical topics such as post-quantum cryptography and real-world MPC applications. nitter+2

Work

Education

Projects

Writing

Zero Knowledge Proofs and ZKDocs (Podcast)

June 11, 2022

Featured voice in a podcast discussing zero-knowledge proofs and the ZKDocs project, including pitfalls in real-world verifiable elections.

Favicon imagepodcasts.apple.com

The Frozen Heart vulnerability in PlonK

A publication disclosing critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems, specifically focusing on PlonK.

Favicon imagesecurityboulevard.com

The Frozen Heart vulnerability in Bulletproofs

A publication disclosing critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems, specifically focusing on Bulletproofs.

Favicon imagesecurityboulevard.com

The Frozen Heart vulnerability in Girault’s proof of knowledge

A publication disclosing critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems, specifically focusing on Girault’s proof of knowledge.

Favicon imagesecurityboulevard.com

Disclosing Shamir’s Secret Sharing vulnerabilities and announcing ZKDocs

Co-authored publication disclosing two bugs affecting Shamir’s Secret Sharing implementation in Binance’s tss-lib and its active forks.

Favicon imagesecurityboulevard.com

ECDSA: Handle with Care

An article discussing the elliptic curve digital signature algorithm (ECDSA), its properties, and potential vulnerabilities.

Favicon imagesecurityboulevard.com

Themes from Real World Crypto 2020

An overview of major themes and impressive work presented at the Real World Crypto 2020 conference.

Favicon imagesecurityboulevard.com

Multi-Party Computation on Machine Learning

An article detailing the development of a multi-party computation (MPC) tool for perceptron and support vector machine (SVM) algorithms, enabling private data analysis.

Favicon imagesecurityboulevard.com