- See Also
-
Links
- “Cryptography in the DNA of Living Cells Enabled by Multi-site Base Editing”, Volf et al 2023
- “Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”, Zhang et al 2023
- “Polynomial Time Cryptanalytic Extraction of Neural Network Models”, Shamir et al 2023
- “Papers With Computer-checked Proofs”, Bernstein 2023
- “Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, Nassi et al 2023
- “Generative Model Watermarking Suppressing High-Frequency Artifacts”, Zhang et al 2023
- “Memorization for Good: Encryption With Autoregressive Language Models”, Stevens & Su 2023
- “One Protocol to Rule Them All? On Securing Interoperable Messaging”, Blessing & Anderson 2023
- “Black-Hole Radiation Decoding Is Quantum Cryptography”, Brakerski 2022
- “Categorical Composable Cryptography: Extended Version”, Broadbent & Karvonen 2022
- “Twin Physically Unclonable Functions Based on Aligned Carbon Nanotube Arrays”, Zhong et al 2022
- “Darknet Traffic Classification and Adversarial Attacks”, Rust-Nguyen & Stamp 2022
- “Planting Undetectable Backdoors in Machine Learning Models”, Goldwasser et al 2022
- “Hiding Data Hiding”, Wu et al 2021
- “Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, Machado & Westphall 2021
- “Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Brustolin et al 2020
- “Cryptanalytic Extraction of Neural Network Models”, Carlini et al 2020
- “The Bouncer Problem: Challenges to Remote Explainability”, Merrer & Tredan 2019
- “Analysis of Solitaire”, Shiu 2019
- “Unsupervised Cipher Cracking Using Discrete GANs”, Gomez et al 2018
- “Difficulties of Timestamping Archived Web Pages”, Aturban et al 2017
- “DDoSCoin: Cryptocurrency With a Malicious Proof-of-Work”, Wustrow & VanderSloot 2016
- “Easy Cryptographic Timestamping of Files”, Gwern 2015
- “What Satoshi Did Not Know”, Andresen 2015
- “Blackmail Fail”, Gwern 2013
- “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Davis 2013
- “John Nash on Cryptography”, Nash 2012
- “Correspondences Regarding Cryptography between John Nash and the NSA [typeset Version]”, Nash & Rosulek 2012
- “National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
- “Bitcoin Is Worse Is Better”, Gwern 2011
- “Time-lock Encryption”, Gwern 2011
- “Death Note: L, Anonymity & Eluding Entropy”, Gwern 2011
- “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Wright et al 2008
- “A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality”, Rodriguez 2006
- “Toward a Broader View of Security Protocols”, Blaze 2004
- “The Numerical-Astrological Ciphers In The Third Book Of Trithemius’s Steganographia”, Ernst 1998
- “A Mystery Unraveled, Twice”, Kolata 1998
- “Solved: The Ciphers In Book III Of Trithemius’s Steganographia”, Reeds 1998
- “Schwarzweisse Magie: Der Schlüssel Zum Dritten Buch Der Steganographia Des Trithemius”, Ernst 1996
- “A Personal View of Average-Case Complexity”, Impagliazzo 1995
- “Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, Feynman 1985
- “The Advent Of Cryptology In The Game Of Bridge”, Winkler 1983
- “The Noblest Cryptographer”, Strass 1983
- “Correspondences Regarding Cryptography between John Nash and the NSA”, Nash 1955
- “Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
- “Safecracking for the Computer Scientist”
- “Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
- Sort By Magic
- Wikipedia
- Miscellaneous
- Link Bibliography
See Also
Links
“Cryptography in the DNA of Living Cells Enabled by Multi-site Base Editing”, Volf et al 2023
“Cryptography in the DNA of living cells enabled by multi-site base editing”
“Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”, Zhang et al 2023
“Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”
“Polynomial Time Cryptanalytic Extraction of Neural Network Models”, Shamir et al 2023
“Polynomial Time Cryptanalytic Extraction of Neural Network Models”
“Papers With Computer-checked Proofs”, Bernstein 2023
“Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, Nassi et al 2023
“Generative Model Watermarking Suppressing High-Frequency Artifacts”, Zhang et al 2023
“Generative Model Watermarking Suppressing High-Frequency Artifacts”
“Memorization for Good: Encryption With Autoregressive Language Models”, Stevens & Su 2023
“Memorization for Good: Encryption with Autoregressive Language Models”
“One Protocol to Rule Them All? On Securing Interoperable Messaging”, Blessing & Anderson 2023
“One Protocol to Rule Them All? On Securing Interoperable Messaging”
“Black-Hole Radiation Decoding Is Quantum Cryptography”, Brakerski 2022
“Categorical Composable Cryptography: Extended Version”, Broadbent & Karvonen 2022
“Twin Physically Unclonable Functions Based on Aligned Carbon Nanotube Arrays”, Zhong et al 2022
“Twin physically unclonable functions based on aligned carbon nanotube arrays”
“Darknet Traffic Classification and Adversarial Attacks”, Rust-Nguyen & Stamp 2022
“Planting Undetectable Backdoors in Machine Learning Models”, Goldwasser et al 2022
“Planting Undetectable Backdoors in Machine Learning Models”
“Hiding Data Hiding”, Wu et al 2021
“Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, Machado & Westphall 2021
“Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”
“Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, Brustolin et al 2020
“Cryptanalytic Extraction of Neural Network Models”, Carlini et al 2020
“The Bouncer Problem: Challenges to Remote Explainability”, Merrer & Tredan 2019
“Analysis of Solitaire”, Shiu 2019
“Unsupervised Cipher Cracking Using Discrete GANs”, Gomez et al 2018
“Difficulties of Timestamping Archived Web Pages”, Aturban et al 2017
“DDoSCoin: Cryptocurrency With a Malicious Proof-of-Work”, Wustrow & VanderSloot 2016
“Easy Cryptographic Timestamping of Files”, Gwern 2015
“What Satoshi Did Not Know”, Andresen 2015
“Blackmail Fail”, Gwern 2013
“The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Davis 2013
“John Nash on Cryptography”, Nash 2012
“Correspondences Regarding Cryptography between John Nash and the NSA [typeset Version]”, Nash & Rosulek 2012
“Correspondences Regarding Cryptography between John Nash and the NSA [typeset version]”
“National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
“National Cryptologic Museum Opens New Exhibit on Dr. John Nash”
“Bitcoin Is Worse Is Better”, Gwern 2011
“Time-lock Encryption”, Gwern 2011
“Death Note: L, Anonymity & Eluding Entropy”, Gwern 2011
“Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Wright et al 2008
“Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”
“A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality”, Rodriguez 2006
“Toward a Broader View of Security Protocols”, Blaze 2004
“The Numerical-Astrological Ciphers In The Third Book Of Trithemius’s Steganographia”, Ernst 1998
“The Numerical-Astrological Ciphers In The Third Book Of Trithemius’s Steganographia”
“A Mystery Unraveled, Twice”, Kolata 1998
“Solved: The Ciphers In Book III Of Trithemius’s Steganographia”, Reeds 1998
“Solved: The Ciphers In Book III Of Trithemius’s Steganographia”
“Schwarzweisse Magie: Der Schlüssel Zum Dritten Buch Der Steganographia Des Trithemius”, Ernst 1996
“Schwarzweisse Magie: Der Schlüssel zum dritten Buch der Steganographia des Trithemius”
“A Personal View of Average-Case Complexity”, Impagliazzo 1995
“Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, Feynman 1985
“Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”
“The Advent Of Cryptology In The Game Of Bridge”, Winkler 1983
“The Noblest Cryptographer”, Strass 1983
“Correspondences Regarding Cryptography between John Nash and the NSA”, Nash 1955
“Correspondences Regarding Cryptography between John Nash and the NSA”
“Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
“Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
“Safecracking for the Computer Scientist”
“Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
“Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
“Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
Sort By Magic
Annotations sorted by machine learning into inferred 'tags'. This provides an alternative way to browse: instead of by date order, one can browse in topic order. The 'sorted' list has been automatically clustered into multiple sections & auto-labeled for easier browsing.
Beginning with the newest annotation, it uses the embedding of each annotation to attempt to create a list of nearest-neighbor annotations, creating a progression of topics. For more details, see the link.
secureprotocol
cryptanalysis
encryption
bitcoin
Wikipedia
Miscellaneous
-
/doc/cs/cryptography/2008-wright-figure34-voippacketfingerprintofthephraseartificialintelligence.png
-
https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/
-
https://jamey.thesharps.us/2023/07/04/breaking-ciphers-with-regular-expressions/
-
https://max.levch.in/post/724289457144070144/shamir-secret-sharing
-
https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649
-
https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/
-
https://vitalik.ca/general/2022/11/19/proof_of_solvency.html
-
https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html
-
https://www.nytimes.com/2022/07/07/arts/ciphers-henry-viii-catherine.html
-
https://www.quantamagazine.org/cryptographers-show-how-to-hide-invisible-backdoors-in-ai-20230302/
-
https://www.quantamagazine.org/how-mathematical-curves-power-cryptography-20220919/
-
https://www.quantamagazine.org/thirty-years-later-a-speed-boost-for-quantum-factoring-20231017/
-
https://www.usenix.org/publications/loginonline/bcrypt-25-retrospective-password-security
Link Bibliography
-
https://arxiv.org/abs/2310.08708
: “Polynomial Time Cryptanalytic Extraction of Neural Network Models”, Adi Shamir, Isaac Canales-Martinez, Anna Hambitzer, Jorge Chavez-Saab, Francisco Rodrigez-Henriquez, Nitin Satpute -
https://cr.yp.to/papers/pwccp-20230907.pdf
: “Papers With Computer-checked Proofs”, Daniel J. Bernstein -
https://eprint.iacr.org/2023/923.pdf
: “Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici -
timestamping
: “Easy Cryptographic Timestamping of Files”, Gwern -
blackmail
: “Blackmail Fail”, Gwern -
2011-davis
: “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, Joshua Davis -
1955-nash
: “John Nash on Cryptography”, John Nash -
bitcoin-is-worse-is-better
: “Bitcoin Is Worse Is Better”, Gwern -
self-decrypting
: “Time-lock Encryption”, Gwern -
death-note-anonymity
: “Death Note: L, Anonymity & Eluding Entropy”, Gwern -
2008-wright.pdf
: “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson -
2007-rodriguez.pdf
: “A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality”, Marko A. Rodriguez -
https://www.nytimes.com/1998/04/14/science/a-mystery-unraveled-twice.html
: “A Mystery Unraveled, Twice”, Gina Kolata -
1998-reeds.pdf
: “Solved: The Ciphers In Book III Of Trithemius’s Steganographia”, Jim Reeds