‘crypto’ tag
- See Also
- Gwern
-
Links
- “Breaking Bad: How Compilers Break Constant-Time”, Schneider et al 2024
- “Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]”
- “Glue and Coprocessor Architectures”, Buterin 2024
- “Piecing Together the Secrets of the Stasi: After the Berlin Wall Fell, Agents of East Germany’s Secret Police Frantically Tore Apart Their Records. Archivists Have Spent the past 30 Years Trying to Restore Them”, Bilger 2024
- “The Solution of the Zodiac Killer’s 340-Character Cipher”, Oranchak et al 2024
- “Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”
- “Cryptography in the DNA of Living Cells Enabled by Multi-Site Base Editing”, Volf et al 2023
- “Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”, Zhang et al 2023
- “Why the French Military Cryptanalysis Failed to Break Enigma”, Foucrier 2023
- “Polynomial Time Cryptanalytic Extraction of Neural Network Models”, Shamir et al 2023
- “Papers With Computer-Checked Proofs”, Bernstein 2023
- “Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, Nassi et al 2023
- “Generative Model Watermarking Suppressing High-Frequency Artifacts”, Zhang et al 2023
- “Memorization for Good: Encryption With Autoregressive Language Models”, Stevens & Su 2023
- “One Protocol to Rule Them All? On Securing Interoperable Messaging”, Blessing & Anderson 2023
- “Black-Hole Radiation Decoding Is Quantum Cryptography”, Brakerski 2022
- “Categorical Composable Cryptography: Extended Version”, Broadbent & Karvonen 2022
- “Twin Physically Unclonable Functions Based on Aligned Carbon Nanotube Arrays”, Zhong et al 2022
- “Darknet Traffic Classification and Adversarial Attacks”, Rust-Nguyen & Stamp 2022
- “Planting Undetectable Backdoors in Machine Learning Models”, Goldwasser et al 2022
- “Verifiable Quantum Advantage without Structure”, Yamakawa & Zhandry 2022
- “Hiding Data Hiding”, Wu et al 2021
- “Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, Machado & Westphall 2021
- “Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Brustolin et al 2020
- “Cryptanalytic Extraction of Neural Network Models”, Carlini et al 2020
- “One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication”
- “The Bouncer Problem: Challenges to Remote Explainability”, Merrer & Tredan 2019
- “Analysis of Solitaire”, Shiu 2019
- “The Professionalization of Cryptology in 16th-Century Venice”, Iordanou 2018
- “Chaff Bugs: Deterring Attackers by Making Software Buggier”, Hu et al 2018
- “Unsupervised Cipher Cracking Using Discrete GANs”, Gomez et al 2018
- “Difficulties of Timestamping Archived Web Pages”, Aturban et al 2017
- “Learning the Enigma With Recurrent Neural Networks”, Greydanus 2017
- “DDoSCoin: Cryptocurrency With a Malicious Proof-Of-Work”, Wustrow & VanderSloot 2016
- “What Satoshi Did Not Know”, Andresen 2015
- “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Davis 2013
- “National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
- “TinyTorrents: Integrating Peer-To-Peer and Wireless Sensor Networks”, McGoldrick 2009
- “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Wright et al 2008
- “A Methodology for Studying Various Interpretations of the N,N-Dimethyltryptamine-Induced Alternate Reality”, Rodriguez 2006
- “Toward a Broader View of Security Protocols”, Blaze 2004
- “Compression and Information Leakage of Plaintext”, Kelsey 2002
- “The Design, Implementation and Operation of an Email Pseudonym Server”, Mazières & Kaashoek 1998
- “A Tale of Two Sieves”, Pomerance 1996
- “A Personal View of Average-Case Complexity”, Impagliazzo 1995
- “Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, Feynman 1985
- “The Noblest Cryptographer”, Strass 1983
- “Programmable Cryptography (Part 1)”, gubsheep 2024
- “Cracking the Adventure Time Cipher”
- “Reward Offered for Hash Collisions for SHA-1, SHA-256, RIPEMD-160 and Other”, Todd 2024
- “2015.11.20: Break a Dozen Secret Keys, Get a Million More for Free”
-
“MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (as of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (like
cond
,let
,lambda
, Etc...).” - “Extremely Linear Git History”, zegl 2024
- “Trusted Third Parties Are Security Holes”, Szabo 2024
- “Zero Tolerance for Bias”
- “Cryonics and Cryptography”
- “The Infinity Machine”
- “A Cryptologic Mystery”, Blaze 2024
- “Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
- “Safecracking for the Computer Scientist”
- “Decoding the Defiance of Henry VIII’s First Wife”
- “Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.”
- Sort By Magic
- Wikipedia
- Miscellaneous
- Bibliography
See Also
Gwern
“Miscellaneous”, Gwern 2009
“Blackmail Fail”, Gwern 2013
“Bitcoin Is Worse Is Better”, Gwern 2011
“Easy Cryptographic Timestamping of Files”, Gwern 2015
“Death Note: L, Anonymity & Eluding Entropy”, Gwern 2011
Links
“Breaking Bad: How Compilers Break Constant-Time”, Schneider et al 2024
“Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]”
Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]:
“Glue and Coprocessor Architectures”, Buterin 2024
“Piecing Together the Secrets of the Stasi: After the Berlin Wall Fell, Agents of East Germany’s Secret Police Frantically Tore Apart Their Records. Archivists Have Spent the past 30 Years Trying to Restore Them”, Bilger 2024
“The Solution of the Zodiac Killer’s 340-Character Cipher”, Oranchak et al 2024
“Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”
Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata
“Cryptography in the DNA of Living Cells Enabled by Multi-Site Base Editing”, Volf et al 2023
Cryptography in the DNA of living cells enabled by multi-site base editing
“Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”, Zhang et al 2023
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
“Why the French Military Cryptanalysis Failed to Break Enigma”, Foucrier 2023
Why the French military cryptanalysis failed to break Enigma
“Polynomial Time Cryptanalytic Extraction of Neural Network Models”, Shamir et al 2023
Polynomial Time Cryptanalytic Extraction of Neural Network Models
“Papers With Computer-Checked Proofs”, Bernstein 2023
“Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, Nassi et al 2023
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
“Generative Model Watermarking Suppressing High-Frequency Artifacts”, Zhang et al 2023
Generative Model Watermarking Suppressing High-Frequency Artifacts
“Memorization for Good: Encryption With Autoregressive Language Models”, Stevens & Su 2023
Memorization for Good: Encryption with Autoregressive Language Models
“One Protocol to Rule Them All? On Securing Interoperable Messaging”, Blessing & Anderson 2023
One Protocol to Rule Them All? On Securing Interoperable Messaging
“Black-Hole Radiation Decoding Is Quantum Cryptography”, Brakerski 2022
“Categorical Composable Cryptography: Extended Version”, Broadbent & Karvonen 2022
“Twin Physically Unclonable Functions Based on Aligned Carbon Nanotube Arrays”, Zhong et al 2022
Twin physically unclonable functions based on aligned carbon nanotube arrays
“Darknet Traffic Classification and Adversarial Attacks”, Rust-Nguyen & Stamp 2022
“Planting Undetectable Backdoors in Machine Learning Models”, Goldwasser et al 2022
“Verifiable Quantum Advantage without Structure”, Yamakawa & Zhandry 2022
“Hiding Data Hiding”, Wu et al 2021
“Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, Machado & Westphall 2021
Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges
“Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Brustolin et al 2020
“Cryptanalytic Extraction of Neural Network Models”, Carlini et al 2020
“One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication”
One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication:
View External Link:
“The Bouncer Problem: Challenges to Remote Explainability”, Merrer & Tredan 2019
“Analysis of Solitaire”, Shiu 2019
“The Professionalization of Cryptology in 16th-Century Venice”, Iordanou 2018
The Professionalization of Cryptology in 16th-Century Venice
“Chaff Bugs: Deterring Attackers by Making Software Buggier”, Hu et al 2018
“Unsupervised Cipher Cracking Using Discrete GANs”, Gomez et al 2018
“Difficulties of Timestamping Archived Web Pages”, Aturban et al 2017
“Learning the Enigma With Recurrent Neural Networks”, Greydanus 2017
Learning the Enigma with Recurrent Neural Networks:
View External Link:
“DDoSCoin: Cryptocurrency With a Malicious Proof-Of-Work”, Wustrow & VanderSloot 2016
“What Satoshi Did Not Know”, Andresen 2015
“The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Davis 2013
“National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
National Cryptologic Museum Opens New Exhibit on Dr. John Nash
“TinyTorrents: Integrating Peer-To-Peer and Wireless Sensor Networks”, McGoldrick 2009
TinyTorrents: Integrating Peer-to-Peer and Wireless Sensor Networks:
“Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Wright et al 2008
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
“A Methodology for Studying Various Interpretations of the N,N-Dimethyltryptamine-Induced Alternate Reality”, Rodriguez 2006
“Toward a Broader View of Security Protocols”, Blaze 2004
“Compression and Information Leakage of Plaintext”, Kelsey 2002
“The Design, Implementation and Operation of an Email Pseudonym Server”, Mazières & Kaashoek 1998
The design, implementation and operation of an email pseudonym server
“A Tale of Two Sieves”, Pomerance 1996
View PDF:
“A Personal View of Average-Case Complexity”, Impagliazzo 1995
“Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, Feynman 1985
Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker
“The Noblest Cryptographer”, Strass 1983
View PDF:
“Programmable Cryptography (Part 1)”, gubsheep 2024
“Cracking the Adventure Time Cipher”
“Reward Offered for Hash Collisions for SHA-1, SHA-256, RIPEMD-160 and Other”, Todd 2024
Reward offered for hash collisions for SHA-1, SHA-256, RIPEMD-160 and other
“2015.11.20: Break a Dozen Secret Keys, Get a Million More for Free”
2015.11.20: Break a dozen secret keys, get a million more for free:
“MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (as of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (like cond
, let
, lambda
, Etc...).”
“Extremely Linear Git History”, zegl 2024
“Trusted Third Parties Are Security Holes”, Szabo 2024
“Zero Tolerance for Bias”
“Cryonics and Cryptography”
“The Infinity Machine”
“A Cryptologic Mystery”, Blaze 2024
“Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks:
“Safecracking for the Computer Scientist”
“Decoding the Defiance of Henry VIII’s First Wife”
“Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks
“Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.”
Sort By Magic
Annotations sorted by machine learning into inferred 'tags'. This provides an alternative way to browse: instead of by date order, one can browse in topic order. The 'sorted' list has been automatically clustered into multiple sections & auto-labeled for easier browsing.
Beginning with the newest annotation, it uses the embedding of each annotation to attempt to create a list of nearest-neighbor annotations, creating a progression of topics. For more details, see the link.
encrypted-communication
cipher-cracking
model-extraction
quantum-cryptography
Wikipedia
Miscellaneous
-
/doc/cs/cryptography/2024-bilger-figure1-reassembledrippedupstasigermanfile.jpg
: -
/doc/cs/cryptography/2008-wright-figure34-voippacketfingerprintofthephraseartificialintelligence.png
: -
https://antigonejournal.com/2024/01/decipherment-linear-b/
: -
https://blog.cryptographyengineering.com/2017/07/02/beyond-public-key-encryption/
: -
https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/
: -
https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/
-
https://cacm.acm.org/research/indistinguishability-obfuscation-from-well-founded-assumptions/
: -
https://github.com/spawnmason/randar-explanation/blob/master/README
-
https://jamey.thesharps.us/2023/07/04/breaking-ciphers-with-regular-expressions/
-
https://max.levch.in/post/724289457144070144/shamir-secret-sharing
-
https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649
-
https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/
-
https://scholar.harvard.edu/files/mickens/files/thisworldofours.pdf
: -
https://spectrum.ieee.org/hans-peter-luhn-and-the-birth-of-the-hashing-algorithm
: -
https://vitalik.eth.limo/general/2022/11/19/proof_of_solvency.html
-
https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html
-
https://www.johndcook.com/blog/2023/12/29/randomize-then-humanize/
:View External Link:
https://www.johndcook.com/blog/2023/12/29/randomize-then-humanize/
-
https://www.johndcook.com/blog/2024/03/09/normalized-cryptograms/
:View External Link:
https://www.johndcook.com/blog/2024/03/09/normalized-cryptograms/
-
https://www.quantamagazine.org/cryptographers-devise-an-approach-for-total-search-privacy-20231106/
: -
https://www.quantamagazine.org/cryptographers-show-how-to-hide-invisible-backdoors-in-ai-20230302/
: -
https://www.quantamagazine.org/how-mathematical-curves-power-cryptography-20220919/
-
https://www.quantamagazine.org/secret-messages-can-hide-in-ai-generated-media-20230518/
-
https://www.quantamagazine.org/thirty-years-later-a-speed-boost-for-quantum-factoring-20231017/
-
https://www.usenix.org/publications/loginonline/bcrypt-25-retrospective-password-security
-
https://zkmulticrush.github.io/
:View External Link:
Bibliography
-
https://www.newyorker.com/magazine/2024/06/03/piecing-together-the-secrets-of-the-stasi
: “Piecing Together the Secrets of the Stasi: After the Berlin Wall Fell, Agents of East Germany’s Secret Police Frantically Tore Apart Their Records. Archivists Have Spent the past 30 Years Trying to Restore Them”, -
https://arxiv.org/abs/2310.08708
: “Polynomial Time Cryptanalytic Extraction of Neural Network Models”, -
https://cr.yp.to/papers/pwccp-20230907.pdf
: “Papers With Computer-Checked Proofs”, -
https://eprint.iacr.org/2023/923.pdf
: “Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, -
2011-davis
: “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, -
2008-wright.pdf
: “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, -
2007-rodriguez.pdf
: “A Methodology for Studying Various Interpretations of the N,N-Dimethyltryptamine-Induced Alternate Reality”,