Computer Scientists Combine Two ‘Beautiful’ Proof Methods [ZK + PCP]
Piecing Together the Secrets of the Stasi: After the Berlin Wall fell, agents of East Germany’s secret police frantically tore apart their records. Archivists have spent the past 30 years trying to restore them
Falsified Photos: Fooling Adobe’s Cryptographically-Signed Metadata
Cryptography in the DNA of living cells enabled by multi-site base editing
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models
Why the French military cryptanalysis failed to break Enigma
Polynomial Time Cryptanalytic Extraction of Neural Network Models
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
Generative Model Watermarking Suppressing High-Frequency Artifacts
Memorization for Good: Encryption with Autoregressive Language Models
One Protocol to Rule Them All? On Securing Interoperable Messaging
Twin physically unclonable functions based on aligned carbon nanotube arrays
Planting Undetectable Backdoors in Machine Learning Models
Blockchain Incentivized Data Forwarding in MANETs: Strategies and Challenges
Exploring the relationship between crypto AG and the CIA in the use of rigged encryption machines for espionage in Brazil
One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication
The Professionalization of Cryptology in 16th-Century Venice
Chaff Bugs: Deterring Attackers by Making Software Buggier
National Cryptologic Museum Opens New Exhibit on Dr. John Nash
TinyTorrents: Integrating Peer-To-Peer and Wireless Sensor Networks
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality
The design, implementation and operation of an email pseudonym server
Surely You’re Joking, Mr. Feynman! Chapter 18: Safecracker Meets Safecracker
Reward Offered for Hash Collisions for SHA-1, SHA-256, RIPEMD-160 and Other
2015.11.20: Break a Dozen Secret Keys, Get a Million More for Free
MalbolgeLisp Is a LISP Interpreter Written in Malbolge. It’s (as of 2020 and 2021), the Most Advanced, Usable Malbolge Program Ever Created. It Supports Everything Lisps Generally Tend to Support (like cond, let, lambda, Etc...).
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks
Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—And Concealed Gross Human Rights Violations.
2024-bilger-figure1-reassembledrippedupstasigermanfile.jpg
2008-wright-figure34-voippacketfingerprintofthephraseartificialintelligence.png
https://antigonejournal.com/2024/01/decipherment-linear-b/
https://blog.cryptographyengineering.com/2017/07/02/beyond-public-key-encryption/
https://blog.cryptographyengineering.com/2018/04/07/hash-based-signatures-an-illustrated-primer/
https://blog.wolfram.com/2021/03/24/the-solution-of-the-zodiac-killers-340-character-cipher/
https://cacm.acm.org/research/indistinguishability-obfuscation-from-well-founded-assumptions/
https://github.com/spawnmason/randar-explanation/blob/master/README
https://jamey.thesharps.us/2023/07/04/breaking-ciphers-with-regular-expressions/
https://max.levch.in/post/724289457144070144/shamir-secret-sharing
https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649
https://micahflee.com/2023/04/capturing-the-flag-with-gpt-4/
https://scholar.harvard.edu/files/mickens/files/thisworldofours.pdf
https://scienceblogs.de/klausis-krypto-kolumne/2019/12/19/bigram-750-challenge-solved-new-world-record-set/
https://spectrum.ieee.org/hans-peter-luhn-and-the-birth-of-the-hashing-algorithm
https://vitalik.eth.limo/general/2022/11/19/proof_of_solvency.html
https://www.ietf.org/archive/id/draft-farrell-tenyearsafter-00.html
https://www.johndcook.com/blog/2023/12/29/randomize-then-humanize/
https://www.johndcook.com/blog/2024/03/09/normalized-cryptograms/
https://www.quantamagazine.org/complexity-theorys-50-year-journey-to-the-limits-of-knowledge-20230817/
https://www.quantamagazine.org/cryptographers-devise-an-approach-for-total-search-privacy-20231106/
https://www.quantamagazine.org/cryptographers-discover-a-new-foundation-for-quantum-secrecy-20240603/
https://www.quantamagazine.org/cryptographers-show-how-to-hide-invisible-backdoors-in-ai-20230302/
https://www.quantamagazine.org/how-mathematical-curves-power-cryptography-20220919/
https://www.quantamagazine.org/magical-error-correction-scheme-proved-inherently-inefficient-20240109/
https://www.quantamagazine.org/researchers-identify-master-problem-underlying-all-cryptography-20220406/
https://www.quantamagazine.org/secret-messages-can-hide-in-ai-generated-media-20230518/
https://www.quantamagazine.org/thirty-years-later-a-speed-boost-for-quantum-factoring-20231017/
https://www.usenix.org/publications/loginonline/bcrypt-25-retrospective-password-security
Piecing Together the Secrets of the Stasi: After the Berlin Wall fell, agents of East Germany’s secret police frantically tore apart their records. Archivists have spent the past 30 years trying to restore them
https%253A%252F%252Fwww.newyorker.com%252Fmagazine%252F2024%252F06%252F03%252Fpiecing-together-the-secrets-of-the-stasi.html
Polynomial Time Cryptanalytic Extraction of Neural Network Models
https%253A%252F%252Fcr.yp.to%252Fpapers%252Fpwccp-20230907.pdf.html
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED
https%253A%252F%252Feprint.iacr.org%252F2023%252F923.pdf.html
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
A Methodology for Studying Various Interpretations of the N,N-dimethyltryptamine-Induced Alternate Reality
Wikipedia Bibliography: