SoK: cryptographic methods for secure machine learning audits
Models That Prove Their Own Correctness
Which ZK proving languages are the most future proof?
Some commonalities between interactive versus non-interactive proof systems
Secure hardware: a high level introduction