Bibliography:

  1. ‘crypto’ tag

  2. Time-lock encryption

  3. OpenSquare: Decentralized Repeated Modular Squaring Service

  4. Verifiable Timed Signatures Made Practical

  5. How to build time-lock encryption

  6. Join Me on a Market for Anonymity

  7. Decentralized Trusted Timestamping using the Crypto Currency Bitcoin

  8. Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles

  9. [Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others

  10. 71c7db5e52bafdb827a3b2555c86915f9b90cf2e.html

  11. Witness Encryption and Its Applications

  12. 5857cab4a410e85b217421d807647abb9a663b59.pdf

  13. High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks

  14. Time-Lock Puzzles in the Random Oracle Model

  15. Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods

  16. 1025678f5bdbec31ce6384a7402271a5283790bc.pdf

  17. LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time

  18. How to time-stamp a digital document

  19. What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?

  20. Timed-Release Crypto

  21. Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle

  22. 4e456646a5612ee2a0900d201c0390948b8e1623.pdf

  23. Time-Lock Puzzles from Randomized Encodings

  24. 8ee23e7f0f686909a83fe6e4a83088bed476b95f.pdf

  25. Time-Lapse Cryptography

  26. a58982cda17c0abd432bbf368e4d995a6ac68990.pdf

  27. Other Advanced Crypto Applications: Timed-Release Crypto

  28. Description of the LCS35 Time Capsule Crypto-Puzzle

  29. Low-Cost SHA-1 Hash Function Architecture for RFID Tags

  30. Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem

  31. Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.

  32. Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe...

  33. 2c70037d3fac77d24f88a0b0846d4fcac9688409.html

  34. ‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf

  35. 2015-kuppusamy.pdf

  36. 2002-magkos.pdf

  37. http://www.itconsult.co.uk/stamper/stampinf.htm

  38. https://bitcoins-code.de/

  39. https://bitcointalk.org/index.php?topic=9047.0

  40. 80d9af18957e99eedc8c606b71e44a9c1fb6200d.html

  41. https://bitslog.com/2015/02/17/faster-sha-256-asics-using-carry-reduced-adders/

  42. https://blog.janestreet.com/really-low-latency-multipliers-and-cryptographic-puzzles/

  43. 68ce637aa08a052399f781ddaf8e7f2fcb45e693.html

  44. https://cis.csail.mit.edu/

  45. https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.5709

  46. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.7127&rep=rep1&type=pdf

  47. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.2.3030&rep=rep1&type=ps

  48. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.460.2104&rep=rep1&type=pdf#page=2

  49. 80a4b65da6013c8c216aee7ef26bd512b69c641e.pdf#page=2

  50. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.597.6304&rep=rep1&type=pdf

  51. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.78.6879&rep=rep1&type=pdf

  52. https://crypto.stackexchange.com/questions/2507/can-i-encrypt-user-input-in-a-way-i-cant-decrypt-it-for-a-certain-period-of-tim

  53. https://crypto.stackexchange.com/questions/606/time-capsule-cryptography

  54. https://en.bitcoin.it/w/index.php?title=User%3AGmaxwell%2Falt_ideas&action=historysubmit&diff=35540&oldid=35539

  55. https://en.bitcoin.it/wiki/Why_a_GPU_mines_faster_than_a_CPU

  56. https://eprint.iacr.org/2017/201

  57. https://eprint.iacr.org/2018/183.pdf

  58. b5b174175c72caaad3e6d42e0b3e5dd895c83f44.pdf

  59. https://eprint.iacr.org/2018/601.pdf

  60. 073d70432c895a8c86f567c30ebf77ac059d21f0.pdf

  61. https://github.com/dorianj/timelock

  62. https://github.com/lahwran/mac-sleeplocker/blob/master/timelock.py

  63. https://github.com/petertodd/timelock

  64. https://github.com/wclarkson/timelock

  65. https://joncharbonneau.substack.com/p/encrypted-mempools

  66. https://mathworld.wolfram.com/SuccessiveSquareMethod.html

  67. https://news.ycombinator.com/item?id=19784469

  68. 3689735dc3ac6be28ac8ab716a99121f4072b6ff.html

  69. https://news.ycombinator.com/item?id=22061752

  70. 0ddcf8a32815e1b8718354e7faa392a1d65ba3be.html

  71. https://news.ycombinator.com/item?id=6508179

  72. d9df8952dc4e2490150ca7dc76daf89e488a497d.html

  73. https://news.ycombinator.com/item?id=6509688

  74. d1dec56499fc61a42d1301b95bebbc6dbfd1da1c.html

  75. https://news.ycombinator.com/item?id=6509826

  76. 618a711a988a1133737e6e710a2324252f67e3fe.html

  77. https://news.ycombinator.com/item?id=7847687

  78. 2e8d107f7f41f4c88a12d53cae14bba94c963dd7.html

  79. https://news.ycombinator.com/item?id=8447175

  80. 2f8c70592c4481c035cbd2b1b8cc9e4b873f14ba.html

  81. https://project-rainbowcrack.com/

  82. 21b11a7c49ac6624e961728d06794e99660efe8d.html

  83. https://project-rainbowcrack.com/buy.php

  84. https://pszal.github.io/papers/cvcbt-szalachowski18.pdf

  85. 73bc3d94ba529239a85510d7519daaa2777ceafd.pdf

  86. https://tuts4you.com/download.php?view.2348

  87. https://vdfresearch.org/

  88. 3650215e3acccff7f2b85e4b80d66cfc1fb97504.html

  89. https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf

  90. https://web.cs.ucla.edu/~rafail/PUBLIC/42.pdf

  91. 8577e154669101c72b9603602f04a19b4d30b8b6.pdf

  92. https://www.cs.jhu.edu/~rdas/finalreport.pdf

  93. https://www.cs.ox.ac.uk/files/9435/tempsig.pdf

  94. 026cc336d06d856371fac1803166a235d6d4f716.pdf

  95. https://www.cs.tufts.edu/comp/116/archive/fall2013/wclarkson.pdf

  96. f1ac32911d45c8bb7f61eb294af029480f6aefcb.pdf

  97. https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle

  98. 82d70410d919c1ec6da67601fb3abd10a8646650.html

  99. https://www.daemonology.net/blog/2011-06-03-insecurity-in-the-jungle.html

  100. https://www.halfbakery.com/idea/Do_20not_20decrypt_20until_20_2e_2e_2e

  101. https://www.iacr.org/conferences/crypto2011/slides/01-3-Mahmoody.pdf

  102. 47a78340326a116041d5bdab26401870c255e1ae.pdf

  103. https://www.microsoft.com/en-us/research/wp-content/uploads/2003/08/crypto03.pdf

  104. 583d60555da1249c2e3e3a62befa5221c19b740b.pdf

  105. https://www.mit.edu/~jlrubin/public/pdfs/858report.pdf

  106. c8954b21519991e6d0facf1e94e3b33e9302ea71.pdf

  107. https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/

  108. 195c46c1aa527786f36fe3e0cd7a9be418c54c78.html

  109. https://www.reddit.com/r/Bitcoin/comments/27adbq/timelock_timerelease_encryption_incentivised_by/

  110. 90f80258c6e03bfb0226cffe1b48e9912fbdebd3.html

  111. https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/

  112. 5db7b5f0e8094a2a3c10074e943207f5b71a2725.html

  113. https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/ccne7bk/

  114. https://www.tarsnap.com/scrypt.html

  115. https://www.tarsnap.com/scrypt/scrypt.pdf

  116. 857472b7a8600b2e68dd1010f89beb288a64c47f.pdf

  117. https://www.wired.com/2010/07/wikileaks-insurance-file/

  118. https://www.wired.com/story/a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/

  119. 10634cd116265f0c418124a616cf4eb0a5d0fd10.html

  120. https://wwwcn.cs.uni-duesseldorf.de/publications/publications/library/Jerschow2010a.pdf

  121. c24c851b0630cbb74d39e4844aca9b1cd57016fa.pdf

  122. How to time-stamp a digital document

  123. %252Fdoc%252Fbitcoin%252F1991-haber.pdf.html