-
‘crypto’ tag
-
Time-lock encryption
-
OpenSquare: Decentralized Repeated Modular Squaring Service
-
Verifiable Timed Signatures Made Practical
-
How to build time-lock encryption
-
Join Me on a Market for Anonymity
-
Decentralized Trusted Timestamping using the Crypto Currency Bitcoin
-
Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles
-
[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others
-
71c7db5e52bafdb827a3b2555c86915f9b90cf2e.html
-
Witness Encryption and Its Applications
-
5857cab4a410e85b217421d807647abb9a663b59.pdf
-
High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks
-
Time-Lock Puzzles in the Random Oracle Model
-
Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods
-
1025678f5bdbec31ce6384a7402271a5283790bc.pdf
-
LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time
-
How to time-stamp a digital document
-
What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?
-
Timed-Release Crypto
-
Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle
-
4e456646a5612ee2a0900d201c0390948b8e1623.pdf
-
Time-Lock Puzzles from Randomized Encodings
-
8ee23e7f0f686909a83fe6e4a83088bed476b95f.pdf
-
Time-Lapse Cryptography
-
a58982cda17c0abd432bbf368e4d995a6ac68990.pdf
-
Other Advanced Crypto Applications: Timed-Release Crypto
-
Description of the LCS35 Time Capsule Crypto-Puzzle
-
Low-Cost SHA-1 Hash Function Architecture for RFID Tags
-
Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem
-
Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.
-
Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe...
-
2c70037d3fac77d24f88a0b0846d4fcac9688409.html
-
‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf
-
2015-kuppusamy.pdf
-
2002-magkos.pdf
-
http://www.itconsult.co.uk/stamper/stampinf.htm
-
https://bitcoins-code.de/
-
https://bitcointalk.org/index.php?topic=9047.0
-
80d9af18957e99eedc8c606b71e44a9c1fb6200d.html
-
https://bitslog.com/2015/02/17/faster-sha-256-asics-using-carry-reduced-adders/
-
https://blog.janestreet.com/really-low-latency-multipliers-and-cryptographic-puzzles/
-
68ce637aa08a052399f781ddaf8e7f2fcb45e693.html
-
https://cis.csail.mit.edu/
-
https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.5709
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.7127&rep=rep1&type=pdf
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.2.3030&rep=rep1&type=ps
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.460.2104&rep=rep1&type=pdf#page=2
-
80a4b65da6013c8c216aee7ef26bd512b69c641e.pdf#page=2
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.597.6304&rep=rep1&type=pdf
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.78.6879&rep=rep1&type=pdf
-
https://crypto.stackexchange.com/questions/2507/can-i-encrypt-user-input-in-a-way-i-cant-decrypt-it-for-a-certain-period-of-tim
-
https://crypto.stackexchange.com/questions/606/time-capsule-cryptography
-
https://en.bitcoin.it/w/index.php?title=User%3AGmaxwell%2Falt_ideas&action=historysubmit&diff=35540&oldid=35539
-
https://en.bitcoin.it/wiki/Why_a_GPU_mines_faster_than_a_CPU
-
https://eprint.iacr.org/2017/201
-
https://eprint.iacr.org/2018/183.pdf
-
b5b174175c72caaad3e6d42e0b3e5dd895c83f44.pdf
-
https://eprint.iacr.org/2018/601.pdf
-
073d70432c895a8c86f567c30ebf77ac059d21f0.pdf
-
https://github.com/dorianj/timelock
-
https://github.com/lahwran/mac-sleeplocker/blob/master/timelock.py
-
https://github.com/petertodd/timelock
-
https://github.com/wclarkson/timelock
-
https://joncharbonneau.substack.com/p/encrypted-mempools
-
https://mathworld.wolfram.com/SuccessiveSquareMethod.html
-
https://news.ycombinator.com/item?id=19784469
-
3689735dc3ac6be28ac8ab716a99121f4072b6ff.html
-
https://news.ycombinator.com/item?id=22061752
-
0ddcf8a32815e1b8718354e7faa392a1d65ba3be.html
-
https://news.ycombinator.com/item?id=6508179
-
d9df8952dc4e2490150ca7dc76daf89e488a497d.html
-
https://news.ycombinator.com/item?id=6509688
-
d1dec56499fc61a42d1301b95bebbc6dbfd1da1c.html
-
https://news.ycombinator.com/item?id=6509826
-
618a711a988a1133737e6e710a2324252f67e3fe.html
-
https://news.ycombinator.com/item?id=7847687
-
2e8d107f7f41f4c88a12d53cae14bba94c963dd7.html
-
https://news.ycombinator.com/item?id=8447175
-
2f8c70592c4481c035cbd2b1b8cc9e4b873f14ba.html
-
https://project-rainbowcrack.com/
-
21b11a7c49ac6624e961728d06794e99660efe8d.html
-
https://project-rainbowcrack.com/buy.php
-
https://pszal.github.io/papers/cvcbt-szalachowski18.pdf
-
73bc3d94ba529239a85510d7519daaa2777ceafd.pdf
-
https://tuts4you.com/download.php?view.2348
-
https://vdfresearch.org/
-
3650215e3acccff7f2b85e4b80d66cfc1fb97504.html
-
https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf
-
https://web.cs.ucla.edu/~rafail/PUBLIC/42.pdf
-
8577e154669101c72b9603602f04a19b4d30b8b6.pdf
-
https://www.cs.jhu.edu/~rdas/finalreport.pdf
-
https://www.cs.ox.ac.uk/files/9435/tempsig.pdf
-
026cc336d06d856371fac1803166a235d6d4f716.pdf
-
https://www.cs.tufts.edu/comp/116/archive/fall2013/wclarkson.pdf
-
f1ac32911d45c8bb7f61eb294af029480f6aefcb.pdf
-
https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle
-
82d70410d919c1ec6da67601fb3abd10a8646650.html
-
https://www.daemonology.net/blog/2011-06-03-insecurity-in-the-jungle.html
-
https://www.halfbakery.com/idea/Do_20not_20decrypt_20until_20_2e_2e_2e
-
https://www.iacr.org/conferences/crypto2011/slides/01-3-Mahmoody.pdf
-
47a78340326a116041d5bdab26401870c255e1ae.pdf
-
https://www.microsoft.com/en-us/research/wp-content/uploads/2003/08/crypto03.pdf
-
583d60555da1249c2e3e3a62befa5221c19b740b.pdf
-
https://www.mit.edu/~jlrubin/public/pdfs/858report.pdf
-
c8954b21519991e6d0facf1e94e3b33e9302ea71.pdf
-
https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/
-
195c46c1aa527786f36fe3e0cd7a9be418c54c78.html
-
https://www.reddit.com/r/Bitcoin/comments/27adbq/timelock_timerelease_encryption_incentivised_by/
-
90f80258c6e03bfb0226cffe1b48e9912fbdebd3.html
-
https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/
-
5db7b5f0e8094a2a3c10074e943207f5b71a2725.html
-
https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/ccne7bk/
-
https://www.tarsnap.com/scrypt.html
-
https://www.tarsnap.com/scrypt/scrypt.pdf
-
857472b7a8600b2e68dd1010f89beb288a64c47f.pdf
-
https://www.wired.com/2010/07/wikileaks-insurance-file/
-
https://www.wired.com/story/a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/
-
10634cd116265f0c418124a616cf4eb0a5d0fd10.html
-
https://wwwcn.cs.uni-duesseldorf.de/publications/publications/library/Jerschow2010a.pdf
-
c24c851b0630cbb74d39e4844aca9b1cd57016fa.pdf
-
How to time-stamp a digital document
-
%252Fdoc%252Fbitcoin%252F1991-haber.pdf.html
-