‘timelock crypto’ directory
See Also
- Gwern
-
Links
- “OpenSquare: Decentralized Repeated Modular Squaring Service ”, Aravinda et al 2021
- “Verifiable Timed Signatures Made Practical ”, Thyagarajan et al 2020
- “How to Build Time-Lock Encryption ”, Liu et al 2018
- “Join Me on a Market for Anonymity ”, Moser & Böhme 2016
- “Decentralized Trusted Timestamping Using the Crypto Currency Bitcoin ”, Gipp et al 2015
- “Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles ”, Skjegstad et al 2014
- “[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others ”, Todd 2013
- “Witness Encryption and Its Applications ”, Garg 2013
- “High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks ”, Cheng 2012
- “Time-Lock Puzzles in the Random Oracle Model ”, Mahmoody et al 2011
- “Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods ”, Haq 2008
- “LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time ”, Mao 2000
- “How to Time-Stamp a Digital Document ”, Haber & Stornetta 1991
- “What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle? ”
- “Timed-Release Crypto ”
- “Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle ”
- “Time-Lock Puzzles from Randomized Encodings ”
- “Time-Lapse Cryptography ”
- “DarkLeaks ”, Taaki 2025
- “Drand: 🎲 A Distributed Randomness Beacon Daemon (Go Implementation) ”, Entropy 2025
- “Other Advanced Crypto Applications: Timed-Release Crypto ”
- “Description of the LCS35 Time Capsule Crypto-Puzzle ”
- “Low-Cost SHA-1 Hash Function Architecture for RFID Tags ”, O’Neill 2025
- “Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem ”, Miller & Gao 2025
- “Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless. ”
- “Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe… ”
- “‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf ”
- Wikipedia
- Miscellaneous
- Bibliography
Gwern
“Time-Lock Encryption ”, Gwern 2011
Links
“OpenSquare: Decentralized Repeated Modular Squaring Service ”, Aravinda et al 2021
“Verifiable Timed Signatures Made Practical ”, Thyagarajan et al 2020
“How to Build Time-Lock Encryption ”, Liu et al 2018
“Join Me on a Market for Anonymity ”, Moser & Böhme 2016
“Decentralized Trusted Timestamping Using the Crypto Currency Bitcoin ”, Gipp et al 2015
Decentralized Trusted Timestamping using the Crypto Currency Bitcoin
“Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles ”, Skjegstad et al 2014
Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles
“[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others ”, Todd 2013
[Bitcoin-development] REWARD offered for hash collisions for SHA1, SHA256, RIPEMD160 and others
“Witness Encryption and Its Applications ”, Garg 2013
Witness Encryption and its Applications
“High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks ”, Cheng 2012
High-frequency self-aligned graphene transistors with transferred gate stacks
“Time-Lock Puzzles in the Random Oracle Model ”, Mahmoody et al 2011
“Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods ”, Haq 2008
Using timed-release cryptography to mitigate preservation risk of embargo periods
“LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time ”, Mao 2000
LNCS 1796—Time-Lock Puzzle with Examinable Evidence of Unlocking Time
“How to Time-Stamp a Digital Document ”, Haber & Stornetta 1991
“What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle? ”
What is the progress on the MIT LCS35 Time Capsule Crypto-Puzzle?
“Timed-Release Crypto ”
“Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle ”
Merkle puzzles are optimal—an 𝒪(n2)-query attack on any key exchange from a random oracle
“Time-Lock Puzzles from Randomized Encodings ”
Time-Lock Puzzles from Randomized Encodings
“Time-Lapse Cryptography ”
“DarkLeaks ”, Taaki 2025
“Drand: 🎲 A Distributed Randomness Beacon Daemon (Go Implementation) ”, Entropy 2025
drand: 🎲 A Distributed Randomness Beacon Daemon (Go implementation)
“Other Advanced Crypto Applications: Timed-Release Crypto ”
“Description of the LCS35 Time Capsule Crypto-Puzzle ”
Description of the LCS35 Time Capsule Crypto-Puzzle
“Low-Cost SHA-1 Hash Function Architecture for RFID Tags ”, O’Neill 2025
“Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem ”, Miller & Gao 2025
Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem
“Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless. ”
“Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe… ”
Reliable time-lock crypto. Step one: obtain a deep-space probe…
“‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf ”
‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf
Wikipedia
Miscellaneous
/doc/
cs/ cryptography/ timelock/ 2015-kuppusamy.pdf : /doc/
cs/ cryptography/ timelock/ 2002-magkos.pdf : https://
bitcointalk.org/ index.php?topic=9047.0 : https://
bitslog.com/ 2015/ 02/ 17/ faster-sha-256-asics-using-carry-reduced-adders/ https://
blog.janestreet.com/ really-low-latency-multipliers-and-cryptographic-puzzles/ : https://
citeseer.ist.psu.edu/ viewdoc/ summary?doi=10.1.1.110.5709 https://
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1.1.108.7127&rep=rep1&type=pdf https://
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1.1.2.3030&rep=rep1&type=ps https://
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1.1.460.2104&rep=rep1&type=pdf#page=2 : https://
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1.1.597.6304&rep=rep1&type=pdf https://
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1.1.78.6879&rep=rep1&type=pdf https://
crypto.stackexchange.com/ questions/ 606/ time-capsule-cryptography https://
en.bitcoin.it/ wiki/ Why_a_GPU_mines_faster_than_a_CPU https://
eprint.iacr.org/ 2017/ 201 : https://
eprint.iacr.org/ 2018/ 183.pdf : https://
eprint.iacr.org/ 2018/ 601.pdf : https://
github.com/ lahwran/ mac-sleeplocker/ blob/ master/ timelock.py https://
mathworld.wolfram.com/ SuccessiveSquareMethod.html : https://
news.ycombinator.com/ item?id=19784469 : https://
news.ycombinator.com/ item?id=22061752 : https://
news.ycombinator.com/ item?id=6508179 : https://
news.ycombinator.com/ item?id=6509688 : https://
news.ycombinator.com/ item?id=6509826 : https://
news.ycombinator.com/ item?id=7847687 : https://
news.ycombinator.com/ item?id=8447175 : https://
project-rainbowcrack.com/ : https://
pszal.github.io/ papers/ cvcbt-szalachowski18.pdf : https://
web.cs.ucla.edu/ ~rafail/ PUBLIC/ 42.pdf : https://
www.cs.ox.ac.uk/ files/ 9435/ tempsig.pdf : https://
www.cs.tufts.edu/ comp/ 116/ archive/ fall2013/ wclarkson.pdf : https://
www.csail.mit.edu/ news/ programmers-solve-mits-20-year-old-cryptographic-puzzle : https://
www.daemonology.net/ blog/ 2011-06-03-insecurity-in-the-jungle.html : https://
www.halfbakery.com/ idea/ Do_20not_20decrypt_20until_20_2e_2e_2e https://
www.iacr.org/ conferences/ crypto2011/ slides/ 01-3-Mahmoody.pdf : https://
www.microsoft.com/ en-us/ research/ wp-content/ uploads/ 2003/ 08/ crypto03.pdf : https://
www.mit.edu/ ~jlrubin/ public/ pdfs/ 858report.pdf : https://
www.quantamagazine.org/ computer-scientists-achieve-crown-jewel-of-cryptography-20201110/ : https://
www.reddit.com/ r/ Bitcoin/ comments/ 27adbq/ timelock_timerelease_encryption_incentivised_by/ : https://
www.reddit.com/ r/ compsci/ comments/ 1nx0n5/ timelock_encryption/ : https://
www.reddit.com/ r/ compsci/ comments/ 1nx0n5/ timelock_encryption/ ccne7bk/ https://
www.tarsnap.com/ scrypt.html : https://
www.tarsnap.com/ scrypt/ scrypt.pdf : https://
www.wired.com/ 2010/ 07/ wikileaks-insurance-file/ : https://
www.wired.com/ story/ a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/ : https://
wwwcn.cs.uni-duesseldorf.de/ publications/ publications/ library/ Jerschow2010a.pdf :
Bibliography
1991-haber.pdf
: “How to Time-Stamp a Digital Document ”,