The calculation of one of the challenges is not done in the same order as specified in the PlonK paper. Since there are already two articles describing attacks derived from the order in which challenges are computed [1] [2], it is important that the code faithfully reflects the specification.