“‘timelock Crypto’ Tag”,2020-10-01
Bibliography for tag
cs/cryptography/timelock, most recent first: 25 annotations & 59 links (parent).
- See Also
- Gwern
- Links
- “OpenSquare: Decentralized Repeated Modular Squaring Service”, et al 2021
- “Verifiable Timed Signatures Made Practical”, et al 2020
- “How to Build Time-Lock Encryption”, et al 2018
- “Join Me on a Market for Anonymity”, Moser & 2016
- “Decentralized Trusted Timestamping Using the Crypto Currency Bitcoin”, et al 2015
- “Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles”, et al 2014
- “[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others”, 2013
- “Witness Encryption and Its Applications”, 2013
- “High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks”, 2012
- “Time-Lock Puzzles in the Random Oracle Model”, et al 2011
- “Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods”, 2008
- “LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time”, 2000
- “How to Time-Stamp a Digital Document”, 1991
- “What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?”
- “Timed-Release Crypto”
- “Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle”
- “Time-Lock Puzzles from Randomized Encodings”
- “Time-Lapse Cryptography”
- “Other Advanced Crypto Applications: Timed-Release Crypto”
- “Description of the LCS35 Time Capsule Crypto-Puzzle”
- “Low-Cost SHA-1 Hash Function Architecture for RFID Tags”, 2024
- “Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem”, 2024
- “Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.”
- “Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe…”
- “‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf”
- Wikipedia
- Miscellaneous
- Bibliography