<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://research.chainsafe.io/blog</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/application-specific-curves</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/archive</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/circle-starks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/dispute-games</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/ec-cheat-cheet</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/forks-arent-always-safe</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/gkr</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/on-token-vesting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/post-quantum-signatures</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/secure-mpc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/security-for-the-paranoid</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/social-choice-theorems</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/audits</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/crypto</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/cryptography</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/da-os</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/development</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/exploits</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/forks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/game-theory</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/gametheory</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/governance</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/incentive-mechanism</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/interoperability</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/keys</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/l-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/mechanism-design</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/p-2-p</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/tokens</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/vulnerabilities</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/wallets</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/tags/zk</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/transaction-fee-mechanism-design</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/blog/xx-network-dev</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/Contact</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/blockchain</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/cryptoeconomics</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/cryptography</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/game-theory</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/gaming</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/interoperability</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/l-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/mpc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/p-2-p</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/tags/zk</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/Team</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/publications</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/E2E-Encrypted-Doc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/Offchain-Mixer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/On-Feasibility-of-Fraud-Proof-Bridges</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/Play-to-Earn</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/SpyPETs</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/Using-Aztec-for-ENS-Privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Publications/Zcash-web-feasibility</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Resources/External/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/Resources/Internal/Miscellaneous</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/featured/talks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://research.chainsafe.io/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>