“‘Crypto’ Tag”,2013-05-07
![]()
Bibliography for tag
cs/cryptography, most recent first: 4 related tags, 63 annotations, & 54 links (parent).
- See Also
- Gwern
- Links
- “Breaking Bad: How Compilers Break Constant-Time”, et al 2024
- “Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]”
- “Glue and Coprocessor Architectures”, 2024
- “Piecing Together the Secrets of the Stasi: After the Berlin Wall Fell, Agents of East Germany’s Secret Police Frantically Tore Apart Their Records. Archivists Have Spent the past 30 Years Trying to Restore Them”, 2024
- “The Solution of the Zodiac Killer’s 340-Character Cipher”, et al 2024
- “Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata”
- “Cryptography in the DNA of Living Cells Enabled by Multi-Site Base Editing”, et al 2023
- “Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models”, et al 2023
- “Why the French Military Cryptanalysis Failed to Break Enigma”, 2023
- “Polynomial Time Cryptanalytic Extraction of Neural Network Models”, et al 2023
- “Papers With Computer-Checked Proofs”, 2023
- “Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED”, et al 2023
- “Generative Model Watermarking Suppressing High-Frequency Artifacts”, et al 2023
- “Memorization for Good: Encryption With Autoregressive Language Models”, 2023
- “One Protocol to Rule Them All? On Securing Interoperable Messaging”, 2023
- “Black-Hole Radiation Decoding Is Quantum Cryptography”, 2022
- “Categorical Composable Cryptography: Extended Version”, 2022
- “Twin Physically Unclonable Functions Based on Aligned Carbon Nanotube Arrays”, et al 2022
- “Darknet Traffic Classification and Adversarial Attacks”, Rust-2022
- “Planting Undetectable Backdoors in Machine Learning Models”, et al 2022
- “Verifiable Quantum Advantage without Structure”, 2022
- “Hiding Data Hiding”, et al 2021
- “Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges”, 2021
- “Exploring the Relationship between Crypto AG and the CIA in the Use of Rigged Encryption Machines for Espionage in Brazil”, et al 2020
- “Cryptanalytic Extraction of Neural Network Models”, et al 2020
- “One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication”
- “The Bouncer Problem: Challenges to Remote Explainability”, 2019
- “Analysis of Solitaire”, 2019
- “The Professionalization of Cryptology in 16th-Century Venice”, 2018
- “Chaff Bugs: Deterring Attackers by Making Software Buggier”, et al 2018
- “Unsupervised Cipher Cracking Using Discrete GANs”, et al 2018
- “Difficulties of Timestamping Archived Web Pages”, et al 2017
- “Learning the Enigma With Recurrent Neural Networks”, 2017
- “DDoSCoin: Cryptocurrency With a Malicious Proof-Of-Work”, Wustrow & Vander2016
- “What Satoshi Did Not Know”, 2015
- “The Crypto-Currency: Bitcoin and Its Mysterious Inventor”, 2013
- “National Cryptologic Museum Opens New Exhibit on Dr. John Nash”, NSA 2012
- “TinyTorrents: Integrating Peer-To-Peer and Wireless Sensor Networks”, 2009
- “Spot Me If You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations”, et al 2008
- “A Methodology for Studying Various Interpretations of the N,N-Dimethyltryptamine-Induced Alternate Reality”, 2006
- “Toward a Broader View of Security Protocols”, 2004
- “Compression and Information Leakage of Plaintext”, 2002
- “The Design, Implementation and Operation of an Email Pseudonym Server”, 1998
- “A Tale of Two Sieves”, 1996
- “A Personal View of Average-Case Complexity”, 1995
- “Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker”, 1985
- “The Noblest Cryptographer”, 1983
- “Programmable Cryptography (Part 1)”, gubsheep 2024
- “Cracking the Adventure Time Cipher”
- “Reward Offered for Hash Collisions for SHA-1, SHA-256, RIPEMD-160 and Other”, 2024
- “2015.11.20: Break a Dozen Secret Keys, Get a Million More for Free”
- “MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (as of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (like
cond,let,lambda, Etc…).”- “Extremely Linear Git History”, zegl 2024
- “Trusted Third Parties Are Security Holes”, 2024
- “Zero Tolerance for Bias”
- “Cryonics and Cryptography”
- “The Infinity Machine”
- “A Cryptologic Mystery”, 2024
- “Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks”
- “Safecracking for the Computer Scientist”
- “Decoding the Defiance of Henry VIII’s First Wife”
- “Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.”
- Sort By Magic
- Wikipedia
- Miscellaneous
- Bibliography