Bibliography:

  1. ‘CS’ tag

  2. ‘John Nash (cryptography)’ tag

  3. ‘steganography’ tag

  4. ‘timelock crypto’ tag

  5. ‘Bitcoin’ tag

  6. Miscellaneous

  7. Blackmail fail

  8. Bitcoin Is Worse Is Better

  9. Easy Cryptographic Timestamping of Files

  10. Death Note: L, Anonymity & Eluding Entropy

  11. Breaking Bad: How Compilers Break Constant-Time

  12. Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]

  13. a44af088384b85aff94c4a4a7a6cdc84430af01c.html

  14. Glue and Coprocessor Architectures

  15. Piecing Together the Secrets of the Stasi: After the Berlin Wall fell, agents of East Germany’s secret police frantically tore apart their records. Archivists have spent the past 30 years trying to restore them

  16. The Solution of the Zodiac Killer’s 340-Character Cipher

  17. Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata

  18. Cryptography in the DNA of living cells enabled by multi-site base editing

  19. Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models

  20. Why the French military cryptanalysis failed to break Enigma

  21. Polynomial Time Cryptanalytic Extraction of Neural Network Models

  22. Papers with computer-checked proofs

  23. Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED

  24. Generative Model Watermarking Suppressing High-Frequency Artifacts

  25. Memorization for Good: Encryption with Autoregressive Language Models

  26. One Protocol to Rule Them All? On Securing Interoperable Messaging

  27. Black-Hole Radiation Decoding is Quantum Cryptography

  28. Categorical composable cryptography: extended version

  29. Twin physically unclonable functions based on aligned carbon nanotube arrays

  30. Darknet Traffic Classification and Adversarial Attacks

  31. Planting Undetectable Backdoors in Machine Learning Models

  32. Verifiable Quantum Advantage without Structure

  33. Hiding Data Hiding

  34. Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges

  35. Exploring the relationship between crypto AG and the CIA in the use of rigged encryption machines for espionage in Brazil

  36. Cryptanalytic Extraction of Neural Network Models

  37. One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication

  38. The Bouncer Problem: Challenges to Remote Explainability

  39. Analysis of Solitaire

  40. The Professionalization of Cryptology in 16th-Century Venice

  41. Chaff Bugs: Deterring Attackers by Making Software Buggier

  42. Unsupervised Cipher Cracking Using Discrete GANs

  43. Difficulties of Timestamping Archived Web Pages

  44. Learning the Enigma With Recurrent Neural Networks

  45. DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work

  46. What Satoshi Did Not Know

  47. The Crypto-Currency: Bitcoin and its mysterious inventor

  48. National Cryptologic Museum Opens New Exhibit on Dr. John Nash

  49. TinyTorrents: Integrating Peer-To-Peer and Wireless Sensor Networks

  50. fdc946cf7b6b3a864dcf314a9e3408acb49c3450.pdf

  51. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations

  52. A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality

  53. Toward a Broader View of Security Protocols

  54. Compression and Information Leakage of Plaintext

  55. The design, implementation and operation of an email pseudonym server

  56. A Tale of Two Sieves

  57. A Personal View of Average-Case Complexity

  58. Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker

  59. The Noblest Cryptographer

  60. Programmable Cryptography (Part 1)

  61. 502d997a79c15f92fa914df84b541732fdeaf5ae.html

  62. Cracking the Adventure Time Cipher

  63. 1f9de2426a9645b6194688d13622fb295adc251b.html

  64. Reward Offered for Hash Collisions for SHA-1, SHA-256, RIPEMD-160 and Other

  65. 2015.11.20: Break a Dozen Secret Keys, Get a Million More for Free

  66. 6570e20cfaeec06b7bbd61152649243e9c0983f2.html

  67. MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (as of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (like cond, let, lambda, Etc...).

  68. Extremely Linear Git History

  69. 7d175b812fed7e9b80bf6fbd1ac442ce5a663961.html

  70. Trusted Third Parties Are Security Holes

  71. Zero Tolerance for Bias

  72. Cryonics and Cryptography

  73. 2cf048e5bd53cc6e58861c5c2974d2e396b0d0e7.html

  74. The Infinity Machine

  75. edf29363c1a08f70b60132824b71426167416a4e.html

  76. A Cryptologic Mystery

  77. 1a3448195e377050be287eeeac8e9430c7899806.html

  78. Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

  79. aae8ec6b37be6e8c7810856526b602659db3ce92.pdf

  80. Safecracking for the Computer Scientist

  81. 05e1e328b4c3067bd08658021150ececdde1a284.pdf

  82. Decoding the Defiance of Henry VIII’s First Wife

  83. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

  84. Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.

  85. design#future-tag-features

    [Transclude the forward-link's context]

  86. 2024-bilger-figure1-reassembledrippedupstasigermanfile.jpg

  87. 2011-08-14-williamyu-mentalrngs.html

  88. 2008-wright-figure34-voippacketfingerprintofthephraseartificialintelligence.png

  89. https://antigonejournal.com/2024/01/decipherment-linear-b/

  90. 01899d1c6dc24e4d5165d4a4115e08550b0a2e95.html

  91. https://blog.cryptographyengineering.com/2017/07/02/beyond-public-key-encryption/

  92. 9b81716d4751cd4d79e1fd38bb19f5dd39e142d6.html

  93. https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/

  94. 3993508f2ac1e271cde9ca6d3a7cf3b6fe6ffca8.html

  95. https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/

  96. https://cacm.acm.org/research/indistinguishability-obfuscation-from-well-founded-assumptions/

  97. b695135d4bb1f59717cdc849190c36900441a8ab.html

  98. https://codahale.com/the-joy-of-duplexes/

  99. https://eprint.iacr.org/2002/160.pdf

  100. 02a8f309193fcb59b92c834d20f81646e7e452c1.pdf

  101. https://eris.codeberg/

  102. https://github.com/makew0rld/merkdir

  103. https://github.com/spawnmason/randar-explanation/blob/master/README

  104. https://github.com/unrealwill/uncroppable

  105. https://github.com/zk-passport/proof-of-passport

  106. https://jamey.thesharps.us/2023/07/04/breaking-ciphers-with-regular-expressions/

  107. https://lock.cmpxchg8b.com/zenbleed.html#discovery

  108. fa9e2adf061c4abf73f43178d684cdd5b2eb6fef.html#discovery

  109. https://max.levch.in/post/724289457144070144/shamir-secret-sharing

  110. https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649

  111. https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/

  112. https://milksad.info/disclosure.html

  113. https://orlp.net/blog/when-random-isnt/

  114. 8cc181b1dbb6aaacf475c134fe685490a9212ada.html

  115. https://scholar.harvard.edu/files/mickens/files/thisworldofours.pdf

  116. 4defb6a4701e9b44f7225864cc3185457597a419.pdf

  117. https://scienceblogs.de/klausis-krypto-kolumne/2019/12/19/bigram-750-challenge-solved-new-world-record-set/

  118. https://spectrum.ieee.org/hans-peter-luhn-and-the-birth-of-the-hashing-algorithm

  119. e452846d922854b741a5d3b14556b611bae4f858.html

  120. https://suricrasia.online/blog/making-amulets-with-llama/

  121. https://udel.edu/~mm/xmas/

  122. https://urbigenous.net/library/alicebob.html

  123. 33f7ff2014ced15ca48ffcb2927b534e3b03fefb.html

  124. https://vitalik.eth.limo/general/2022/11/19/proof_of_solvency.html

  125. https://vitalik.eth.limo/general/2024/01/30/cryptoai.html

  126. https://web.mit.edu/jemorris/humor/alice-and-bob

  127. 1b40294d7ebfafd6a0a83c75621769ec596ac0a9.html

  128. https://www.bell-labs.com/usr/dmr/www/crypt.html

  129. 3ffe01bfd3395e5c0af6f28ddad04fb073fd97be.html

  130. https://www.datagubbe.se/voynich/

  131. https://www.hillelwayne.com/post/randomness/

  132. 4666fa7916289f35b16adc4948d6f15a1f1366cb.html

  133. https://www.iacr.org/authors/tikz/

  134. https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html

  135. https://www.jeremykun.com/2024/05/04/fhe-overview/

  136. 58b854723c05ce2e56dd4e763514083e99061094.html

  137. https://www.johndcook.com/blog/2023/12/29/randomize-then-humanize/

  138. https://www.johndcook.com/blog/2024/03/09/normalized-cryptograms/

  139. https://www.quantamagazine.org/complexity-theorys-50-year-journey-to-the-limits-of-knowledge-20230817/

  140. https://www.quantamagazine.org/cryptographers-devise-an-approach-for-total-search-privacy-20231106/

  141. db5eb45f452026ac5238ee4a523ce80b89c10339.html

  142. https://www.quantamagazine.org/cryptographers-discover-a-new-foundation-for-quantum-secrecy-20240603/

  143. https://www.quantamagazine.org/cryptographers-show-how-to-hide-invisible-backdoors-in-ai-20230302/

  144. 7015a7e8976cc609b880132b0e12ee7833add34b.html

  145. https://www.quantamagazine.org/how-mathematical-curves-power-cryptography-20220919/

  146. https://www.quantamagazine.org/magical-error-correction-scheme-proved-inherently-inefficient-20240109/

  147. 0c49372e0e7306c596be73cf8c58af2d14c25c8d.html

  148. https://www.quantamagazine.org/researchers-identify-master-problem-underlying-all-cryptography-20220406/

  149. 087daaaa5a830ae49f1eac304f39aebaa34a2ee3.html

  150. https://www.quantamagazine.org/secret-messages-can-hide-in-ai-generated-media-20230518/

  151. https://www.quantamagazine.org/thirty-years-later-a-speed-boost-for-quantum-factoring-20231017/

  152. https://www.usenix.org/publications/loginonline/bcrypt-25-retrospective-password-security

  153. https://www.zellic.io/blog/mpc-from-scratch/

  154. c1d1493c970828e072a9bb8fda90e8f33603d41c.html

  155. https://x.com/evanthebouncy/status/1642918859866009600

  156. https://x.com/mattblaze/status/1553254965870841856

  157. https://x.com/realhashbreaker/status/1770161965006008570

  158. https://zkmulticrush.github.io/

  159. Piecing Together the Secrets of the Stasi: After the Berlin Wall fell, agents of East Germany’s secret police frantically tore apart their records. Archivists have spent the past 30 years trying to restore them

  160. https%253A%252F%252Fwww.newyorker.com%252Fmagazine%252F2024%252F06%252F03%252Fpiecing-together-the-secrets-of-the-stasi.html

  161. Polynomial Time Cryptanalytic Extraction of Neural Network Models

  162. https%253A%252F%252Farxiv.org%252Fabs%252F2310.08708.html

  163. Papers with computer-checked proofs

  164. https%253A%252F%252Fcr.yp.to%252Fpapers%252Fpwccp-20230907.pdf.html

  165. Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED

  166. https%253A%252F%252Feprint.iacr.org%252F2023%252F923.pdf.html

  167. The Crypto-Currency: Bitcoin and its mysterious inventor

  168. %252Fdoc%252Fbitcoin%252F2011-davis.html

  169. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations

  170. %252Fdoc%252Fcs%252Fcryptography%252F2008-wright.pdf.html

  171. A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality

  172. %252Fdoc%252Fpsychedelic%252F2007-rodriguez.pdf.html