- See Also
-
Links
- “One Protocol to Rule Them All? On Securing Interoperable Messaging”, 2023
- “Categorical Composable Cryptography: Extended Version”, 2022
- “Darknet Traffic Classification and Adversarial Attacks”, Rust-2022
- “Planting Undetectable Backdoors in Machine Learning Models”, Et Al 2022
- “OpenSquare: Decentralized Repeated Modular Squaring Service”, Et Al 2021
- “Hiding Data Hiding”, Et Al 2021
- “Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, 2021
- “Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Et Al 2020
- “Verifiable Timed Signatures Made Practical”, Et Al 2020
- “How to Build Time-lock Encryption”, Et Al 2018
- “Unsupervised Cipher Cracking Using Discrete GANs”, Et Al 2018
- “Difficulties of Timestamping Archived Web Pages”, Et Al 2017
- “DDoSCoin: Cryptocurrency With a Malicious Proof-of-Work”, Wustrow & Vander2016
- “Easy Cryptographic Timestamping of Files”, 2015
- “What Satoshi Did Not Know”, 2015
- “Improved Cryptographic Puzzle Based on Modular Exponentiation”
- “Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles”, Et Al 2014
- “Blackmail Fail”, 2013
- “[Bitcoin-development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others”, 2013
- “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, 2013
- “John Nash on Cryptography”, 2012
- “Correspondences Regarding Cryptography between John Nash and the NSA [typeset Version]”, 2012
- “National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
- “Time-Lock Puzzles in the Random Oracle Model”, Et Al 2011
- “Bitcoin Is Worse Is Better”, 2011
- “Time-lock Encryption”, 2011
- “Death Note: L, Anonymity & Eluding Entropy”, 2011
- “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Et Al 2008
- “Toward a Broader View of Security Protocols”, 2004
- “Software-based Receipt-freeness in On-line Elections”, Magkos & Al 2002
- “LNCS 1796 - Time-Lock Puzzle With Examinable Evidence of Unlocking Time”, 2000
- “Solved: The Ciphers In Book III Of Trithemius’s Steganographia”, 1998
- “A Personal View of Average-Case Complexity”, 1995
- “Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, 1985
- “Correspondences Regarding Cryptography between John Nash and the NSA”, 1955
- “Timed-Release Crypto”
- “Time-Lapse Cryptography”
- “Low-Cost SHA-1 Hash Function Architecture for RFID Tags”
- “Research on Timed-Release Encryption”
- “`It’s Done in Hardware so It’s Cheap`”
- “Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
- “Safecracking for the Computer Scientist”
- “Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
- Wikipedia
- Miscellaneous
- Link Bibliography
See Also
Links
“One Protocol to Rule Them All? On Securing Interoperable Messaging”, 2023
“One Protocol to Rule Them All? On Securing Interoperable Messaging”, 2023-03-24 (similar)
“Categorical Composable Cryptography: Extended Version”, 2022
“Categorical composable cryptography: extended version”, 2022-08-28 (similar)
“Darknet Traffic Classification and Adversarial Attacks”, Rust-2022
“Darknet Traffic Classification and Adversarial Attacks”, 2022-06-12 ( ; similar)
“Planting Undetectable Backdoors in Machine Learning Models”, Et Al 2022
“Planting Undetectable Backdoors in Machine Learning Models”, 2022-04-14 ( ; similar)
“OpenSquare: Decentralized Repeated Modular Squaring Service”, Et Al 2021
“OpenSquare: Decentralized Repeated Modular Squaring Service”, 2021-09-22 (backlinks; similar)
“Hiding Data Hiding”, Et Al 2021
“Hiding Data Hiding”, 2021-02-13 ( ; similar)
“Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, 2021
“Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, 2021-01 (similar)
“Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Et Al 2020
“Exploring the relationship between crypto AG and the CIA in the use of rigged encryption machines for espionage in Brazil”, 2020-11-17 (similar)
“Verifiable Timed Signatures Made Practical”, Et Al 2020
“Verifiable Timed Signatures Made Practical”, 2020-10-01 (backlinks; similar)
“How to Build Time-lock Encryption”, Et Al 2018
“How to build time-lock encryption”, 2018-01-20 ( ; backlinks; similar)
“Unsupervised Cipher Cracking Using Discrete GANs”, Et Al 2018
“Unsupervised Cipher Cracking Using Discrete GANs”, 2018-01-15 ( ; similar)
“Difficulties of Timestamping Archived Web Pages”, Et Al 2017
“Difficulties of Timestamping Archived Web Pages”, 2017-12-08 ( ; backlinks)
“DDoSCoin: Cryptocurrency With a Malicious Proof-of-Work”, Wustrow & Vander2016
“DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work”, 2016-08-08 ( ; similar)
“Easy Cryptographic Timestamping of Files”, 2015
“Easy Cryptographic Timestamping of Files”, 2015-12-04 ( ; backlinks; similar; bibliography)
“What Satoshi Did Not Know”, 2015
“What Satoshi Did Not Know”, 2015-07-16 ( ; backlinks; similar)
“Improved Cryptographic Puzzle Based on Modular Exponentiation”
“Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles”, Et Al 2014
“Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles”, 2014-12-15 (backlinks; similar)
“Blackmail Fail”, 2013
“Blackmail fail”, 2013-12-10 ( ; backlinks; similar; bibliography)
“[Bitcoin-development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others”, 2013
“The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, 2013
“The Crypto-Currency: Bitcoin and its mysterious inventor”, 2013-04-18 ( ; backlinks; similar; bibliography)
“John Nash on Cryptography”, 2012
“John Nash on cryptography”, 2012-02-22 (similar; bibliography)
“Correspondences Regarding Cryptography between John Nash and the NSA [typeset Version]”, 2012
“Correspondences Regarding Cryptography between John Nash and the NSA [typeset version]”, 2012-02-20 (backlinks; similar)
“National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
“National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, 2012-01-27 ( ; backlinks; similar)
“Time-Lock Puzzles in the Random Oracle Model”, Et Al 2011
“Time-Lock Puzzles in the Random Oracle Model”, 2011-07-18 (similar)
“Bitcoin Is Worse Is Better”, 2011
“Bitcoin Is Worse Is Better”, 2011-05-27 ( ; backlinks; similar; bibliography)
“Time-lock Encryption”, 2011
“Time-lock encryption”, 2011-05-24 ( ; backlinks; similar; bibliography)
“Death Note: L, Anonymity & Eluding Entropy”, 2011
“Death Note: L, Anonymity & Eluding Entropy”, 2011-05-04 ( ; backlinks; similar; bibliography)
“Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Et Al 2008
“Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, 2008-05-18 (similar; bibliography)
“Toward a Broader View of Security Protocols”, 2004
“Toward a Broader View of Security Protocols”, 2004-03-06 ( ; backlinks; similar)
“Software-based Receipt-freeness in On-line Elections”, Magkos & Al 2002
“LNCS 1796 - Time-Lock Puzzle With Examinable Evidence of Unlocking Time”, 2000
“Solved: The Ciphers In Book III Of Trithemius’s Steganographia”, 1998
“Solved: The Ciphers In Book III Of Trithemius's Steganographia”, 1998 (similar)
“A Personal View of Average-Case Complexity”, 1995
“A Personal View of Average-Case Complexity”, 1995-06-19 ( ; backlinks; similar)
“Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, 1985
“Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, 1985 (backlinks; similar)
“Correspondences Regarding Cryptography between John Nash and the NSA”, 1955
“Correspondences Regarding Cryptography between John Nash and the NSA”, 1955-01 (backlinks; similar)
“Timed-Release Crypto”
“Time-Lapse Cryptography”
“Research on Timed-Release Encryption”
“`It’s Done in Hardware so It’s Cheap`”
“Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
“Safecracking for the Computer Scientist”
“Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
“Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
Wikipedia
Miscellaneous
Link Bibliography
-
timestamping
: “Easy Cryptographic Timestamping of Files”, Gwern Branwen: -
blackmail
: “Blackmail Fail”, Gwern Branwen: -
2011-davis
: “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Joshua Davis: -
1955-nash
: “John Nash on Cryptography”, John Nash: -
bitcoin-is-worse-is-better
: “Bitcoin Is Worse Is Better”, Gwern Branwen: -
self-decrypting
: “Time-lock Encryption”, Gwern Branwen: -
death-note-anonymity
: “Death Note: L, Anonymity & Eluding Entropy”, Gwern Branwen: -
2008-wright.pdf
: “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson: