Bibliography (140):

  1. https://www.wired.com/2010/07/wikileaks-insurance-file/

  2. Time-Lock Puzzles in the Random Oracle Model

  3. https://crypto.stackexchange.com/questions/2507/can-i-encrypt-user-input-in-a-way-i-cant-decrypt-it-for-a-certain-period-of-tim

  4. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.7127&rep=rep1&type=pdf

  5. Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods

  6. Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem

  7. 2002-magkos.pdf

  8. Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles

  9. https://wwwcn.cs.uni-duesseldorf.de/publications/publications/library/Jerschow2010a.pdf

  10. Silk Road 1: Theory & Practice

  11. Contract

  12. https://news.ycombinator.com/item?id=6509826

  13. https://tuts4you.com/download.php?view.2348

  14. https://www.halfbakery.com/idea/Do_20not_20decrypt_20until_20_2e_2e_2e

  15. https://cis.csail.mit.edu/

  16. Time-Lapse Cryptography

  17. https://web.cs.ucla.edu/~rafail/PUBLIC/42.pdf

  18. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.2.3030&rep=rep1&type=ps

  19. Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe…

  20. Bitcoin Is Worse Is Better

  21. https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.5709

  22. Timed-Release Crypto

  23. Other Advanced Crypto Applications: Timed-Release Crypto

  24. https://www.daemonology.net/blog/2011-06-03-insecurity-in-the-jungle.html

  25. ‘It’s Done in Hardware so It’s Cheap’

  26. https://bitcointalk.org/index.php?topic=9047.0

  27. https://www.reddit.com/r/Bitcoin/comments/hhd4l/fpga_mining/

  28. Low-Cost SHA-1 Hash Function Architecture for RFID Tags

  29. https://www.xilinx.com/prs_rls/silicon_spart/0333spartan3.htm

  30. https://mathworld.wolfram.com/SuccessiveSquareMethod.html

  31. Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle

  32. 2015-kuppusamy.pdf

  33. Description of the LCS35 Time Capsule Crypto-Puzzle

  34. What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?

  35. LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time

  36. High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks

  37. [Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others

  38. https://www.wired.com/story/a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/

  39. https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle

  40. https://bitcoins-code.de/

  41. https://news.ycombinator.com/item?id=19784469

  42. https://vdfresearch.org/

  43. https://eprint.iacr.org/2018/601.pdf

  44. https://en.bitcoin.it/wiki/Why_a_GPU_mines_faster_than_a_CPU

  45. Mining Hardware Comparison

  46. Bitcoin Map

  47. Comparison between Bitcoin and Litecoin

  48. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.460.2104&rep=rep1&type=pdf#page=2

  49. https://project-rainbowcrack.com/

  50. https://project-rainbowcrack.com/buy.php

  51. https://github.com/lahwran/mac-sleeplocker/blob/master/timelock.py

  52. https://news.ycombinator.com/item?id=6509688

  53. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.597.6304&rep=rep1&type=pdf

  54. https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/ccne7bk/

  55. https://bitslog.com/2015/02/17/faster-sha-256-asics-using-carry-reduced-adders/

  56. https://github.com/petertodd/timelock

  57. https://www.reddit.com/r/Bitcoin/comments/27adbq/timelock_timerelease_encryption_incentivised_by/

  58. https://news.ycombinator.com/item?id=7847687

  59. https://github.com/dorianj/timelock

  60. https://en.bitcoin.it/w/index.php?title=User%3AGmaxwell%2Falt_ideas&action=historysubmit&diff=35540&oldid=35539

  61. ‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf

  62. Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.

  63. How to build time-lock encryption

  64. How to build time-lock encryption

  65. Time-Lock Puzzles from Randomized Encodings

  66. Witness Encryption and Its Applications

  67. Join Me on a Market for Anonymity

  68. https://www.iacr.org/conferences/crypto2011/slides/01-3-Mahmoody.pdf

  69. https://www.microsoft.com/en-us/research/wp-content/uploads/2003/08/crypto03.pdf

  70. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.78.6879&rep=rep1&type=pdf

  71. https://www.cs.jhu.edu/~rdas/finalreport.pdf

  72. https://www.tarsnap.com/scrypt.html

  73. https://www.tarsnap.com/scrypt/scrypt.pdf

  74. https://crypto.stackexchange.com/questions/606/time-capsule-cryptography

  75. https://news.ycombinator.com/item?id=6508179

  76. https://news.ycombinator.com/item?id=8447175

  77. https://news.ycombinator.com/item?id=22061752

  78. https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/

  79. https://eprint.iacr.org/2017/201

  80. https://www.cs.ox.ac.uk/files/9435/tempsig.pdf

  81. https://www.mit.edu/~jlrubin/public/pdfs/858report.pdf

  82. https://www.cs.tufts.edu/comp/116/archive/fall2013/wclarkson.pdf

  83. https://github.com/wclarkson/timelock

  84. https://eprint.iacr.org/2018/183.pdf

  85. https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf

  86. https://pszal.github.io/papers/cvcbt-szalachowski18.pdf

  87. https://blog.janestreet.com/really-low-latency-multipliers-and-cryptographic-puzzles/

  88. Verifiable Timed Signatures Made Practical

  89. https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/

  90. OpenSquare: Decentralized Repeated Modular Squaring Service

  91. Wikipedia Bibliography:

    1. Advanced Encryption Standard

    2. Digital currency  :

    3. Key escrow  :

    4. Antivirus software  :

    5. OpenSSL  :

    6. Secret sharing

    7. Trusted timestamping

    8. Trusted third party  :

    9. Software Guard Extensions

    10. Spectre (security vulnerability)

    11. Secure multi-party computation

    12. Proof of work

    13. Gerald Bull

    14. Time lock  :

    15. Ron Rivest

    16. Adi Shamir

    17. David A. Wagner  :

    18. Timothy C. May

    19. Cypherpunk

    20. EFF DES cracker  :

    21. Custom hardware attack  :

    22. MD5  :

    23. Application-specific integrated circuit

    24. Key stretching § Strength and time  :

    25. Field-programmable gate array

    26. Merkle’s Puzzles

    27. MIT Computer Science and Artificial Intelligence Laboratory

    28. N-body problem

    29. Gravity Pipe  :

    30. Graphene  :

    31. Shor’s algorithm

    32. Vitalik Buterin

    33. GNU Multiple Precision Arithmetic Library  :

    34. Bitcoin

    35. General-purpose computing on graphics processing units § Applications  :

    36. Rainbow table

    37. Cryptographic hash function

    38. Bcrypt

    39. Avalanche effect  :

    40. Superconducting computing  :

    41. Self-extracting archive  :

    42. Homomorphic encryption

    43. NP-completeness

    44. Conjunctive normal form  :

    45. Random oracle

    46. Memory hierarchy

    47. Processor register

    48. CPU cache  :

    49. Hashcash

    50. Stack Exchange  :