Brian D. Colwell

Menu
  • Home
  • Blog
  • Contact
Menu

The Big List Of Cryptography Resources

Posted on June 2, 2025June 3, 2025 by Brian Colwell

The Big List Of Cryptography Resources is organized in chronological order. Enjoy!

1957 – An Introduction To Probability Theory & Its Applications, Vol. I (William Feller) – https://bitcoinwords.github.io/assets/papers/an-introduction-to-probability-theory-and-its-applications.pdf

1970 – Public-Key Cryptography Discovered At GCHQ In Secret (James Ellis) – https://ethw.org/Milestones:Invention_of_Public-key_Cryptography,_1969_-_1975#:~:text=At%20Great%20Britain’s%20Government%20Communications,key%20cryptography’%20could%20be%20achieved.

1973 – RSA Cryptosystem Discovered At GCHQ In Secret (Clifford Cocks) – https://www.techtarget.com/searchsecurity/definition/RSA#:~:text=RSA%20was%20first%20publicly%20described,U.K.’s%20GCHQ%20until%201997

1974 – A Protocol for Packet Network Intercommunication (Cerf, Khan) – https://bitcoinstan.io/prehistory/doc/1974.pdf

1976 – Public-key Cryptography Discovered At Stanford (Diffie, Hellman) – https://groups.csail.mit.edu/mac/classes/6.001/ST98/psets/ps2web/ps2-elgamal/node1.html

1976 – New Directions In Cryptography (Whitfield Diffie, Martin Hellman) – https://ee.stanford.edu/~hellman/publications/24.pdf

1977 – A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (R.L. Rivest, A. Shamir, L. Adleman) – https://people.csail.mit.edu/rivest/Rsapaper.pdf

1978 – Protocols For Public Key Cryptosystems (Ralph C. Merkle) – https://www.ralphmerkle.com/papers/Protocols.pdf

1978 – Secure Communications Over Insecure Channels (Ralph C. Merkle) – https://nakamotoinstitute.org/static/docs/secure-communications-insecure-channels.pdf

1978 – An Overview of Public Key Cryptography (Martin E. Hellman) – https://ee.stanford.edu/~hellman/publications/31.pdf

1978 – Implementating Capability Based Protection Using Encryption (D. Chaum, R.S. Fabry) – https://chaum.com/wp-content/uploads/2022/02/Implementing-capability-based-protection-using-encryption.pdf

1979 – Computer Systems Established, Maintained & Trusted By Mutually Suspicious Groups (D. Chaum) – https://chaum.com/wp-content/uploads/2022/02/techrep.pdf + 1982 dissertation – https://chaum.com/wp-content/uploads/2022/02/chaum_dissertation.pdf

1979 – Secrecy, Authentication & Public Key Systems (Ralph C. Merkle) – https://nakamotoinstitute.org/static/docs/secrecy-authentication-and-public-key-systems.pdf

1980 – Protocols For Public Key Cryptosystems (Merkle, R.C.) – https://www.ralphmerkle.com/papers/Protocols.pdf

1981 – Silo Watching (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Silo-Watching.pdf

1981 – Untraceable Electronic Mail, Return Addresses & Digital Pseudonyms (D. Chaum) – https://chaum.com/wp-content/uploads/2021/12/chaum-mix.pdf + tech report

1982 – The Byzantine Generals Problem (Marshall Pease, Robert Shostak, Leslie Lamport) – https://lamport.azurewebsites.net/pubs/pubs.html?from=https://research.microsoft.com/en-us/um/people/lamport/pubs/pubs.html&type=path#byz

1982 – Design Concepts For Tamper-Responding Systems (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Design-Concepts-for-Tamper-Responding-Systems.pdf

1982 – Blind Signatures For Untraceable Payments (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-blind-signatures.pdf

Unpublished – Grassroots Democracy (D. Chaum) – https://chaum.com/wp-content/uploads/2022/09/7th-Estate-PDF.pdf

1984 – A New Paradigm For Individuals In The Information Age (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-New-Paradigm-for-Individuals-in-Information-Age.pdf

1984 – Reflections On Trusting Trust (Ken Thompson) – https://dl.acm.org/doi/10.1145/358198.358210 & https://nakamotoinstitute.org/static/docs/reflections-on-trusting-trust.pdf

1985 – Security Without Identification – Card Computers To Make Big Brother Obsolete (David Chaum) – https://www.chaum.com/publications/Security_Wthout_Identification.html

1985 – Elliptic curve cryptography: The serpentine course of a paradigm shift (Koblitz, Menezes) – https://bitcoinstan.io/prehistory/doc/1985.pdf

1985 – Extensible Partial Key, Key Safeguarding & Threshold Systems (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum1985-Chapter-How-To-Keep-a-Secret-Alive.pdf

1986 – Some Variations On RSA Signatures & Their Security (D. Chaum, W. de Jonge) – https://chaum.com/wp-content/uploads/2022/01/Jonge-Chaum-1987-Chapter-Some-Variations-On-RSA-Signatures.pdf

1986 – Attacks On Some RSA Signature Schemes (D. Chaum, W. de Jonge) – https://chaum.com/wp-content/uploads/2022/01/Jonge-Chaum-1986-Chapter-Attacks-on-Some-RSA-Signatures.pdf

1986 – Demonstrating Public Predicate Can Be Satisfied Without Revealing Information About How (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1987-Chapter-Demonstrating-That-a-Public-Predicate-Can-Be-Satisfied.pdf

1986 – Cryptanalysis Of DES With Reduced Number Of Rounds (D. Chaum, J.H. Evertse) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Evertse-1986-Chapter-Cryptanalysis-of-DES-With-a-Reduced.pdf

1987 – From Crossbows To Cryptography: Techno-Thwarting The State (​​Chuck Hammill) – https://nakamotoinstitute.org/from-crossbows-to-cryptography/

1987 – A Secure & Privacy-Protecting Protocol For Transmitting Personal Information Between Organizations (D. Chaum, J.H. Evertse) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Evertse-1987-Chapter-A-Secure-and-Privacy-Protecting-Protocol.pdf

1987 – Demonstrating Possession Of Discrete Log Without Revealing It (D. Chaum, J.H. Evertse, J. van de Graaf, R. Peralta) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1987-Chapter-Demonstrating-Possession-of-a-Discrete-Log.pdf

1987 – Blinding For Unanticipated Signatures (D. Chaum, W.L. Price) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1988-Chapter-Blinding-For-Unanticipated-Signatures.pdf

1987 – Multiparty Computations Ensuring Secrecy Of Each Party’s Input & Correctness Of Result (D. Chaum, I.B. Damgerd, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/multiparty_computation.pdf

1988 – Untraceable Electronic Cash (D. Chaum, A. Fiat, M. Naor) – https://chaum.com/wp-content/uploads/2021/12/Untraceable_Electronic_Cash.pdf

1988 – Untraceable Electronic Mail, Return Addresses & Digital Pseudonyms (David Chaum) – https://nakamotoinstitute.org/static/docs/untraceable-electronic-mail.pdf

1988 – The Dining Cryptographers Problem: Unconditional Sender Untraceability (D. Chaum as guest) – https://chaum.com/wp-content/uploads/2022/01/chaum-dc.pdf

1988 – The Crypto Anarchist Manifesto – (Timothy May) – https://activism.net/cypherpunk/crypto-anarchy.html

1988 – Improved Protocol For Demonstrating Possession Of Discrete Logarithm (D. Chaum, J.H. Evertse, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1988-Chapter-An-Improved-Protocol-For-Demonstrating.pdf

1988 – Gradual & Verifiable Release Of A Secret (E.F. Brickell, D. Chaum, I.B. Damgerd, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/Brickell1988-Chapter-Gradual-and-Verifiable-Release-of-a-Secret.pdf

1988 – Minimum Disclosure Proofs Of Knowledge (G. Brassard, D. Chaum, C. Crepeau) – https://chaum.com/wp-content/uploads/2021/12/Minimum_Disclosure_Proofs_of_Knowledge.pdf

1988 – Multiparty Unconditionally Secure Protocols (D. Chaum, C. Crhpeau, I. Damgerd) – https://chaum.com/wp-content/uploads/2021/12/Multiparty_unconditionally_secure_protocols.pdf

1989 – The Part-time Parliament. Digital Equipment Corp (Lamport, L.) – https://lamport.azurewebsites.net/pubs/lamport-paxos.pdf

1989 – Online Cash Checks (David Chaum) – https://nakamotoinstitute.org/online-cash-checks/

1989 – The Spymasters Double Agent Problem (D. Chaum) – https://chaum.com/wp-content/uploads/2021/12/spymasters_double_agent_problem.pdf

1989 – Privacy Protected Payments: Unconditional Payer & Payee Untraceability (D. Chaum) – https://chaum.com/wp-content/uploads/2022/02/Privacy-protected-payments-unconditioanal….pdf

1989 – Untraceable Electronic Cash with Digicash (Waleed Abrar) – https://bitcoinstan.io/prehistory/doc/1989.pdf

1990 – Unconditionally-Secure Digital Signatures (D. Chaum, S. Roijakkers) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Roijakkers-1991-Chapter-Unconditionally-Secure-Digital-Signatures.pdf

1990 – Zero-Knowledge Undeniable Signatures (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1991-Chapter-Zero-Knowledge-Undeniable-Signatures.pdf

1990 – Implementing Fault-Tolerant Services Using State Machine Approach (Fred B. Schneider) – https://nakamotoinstitute.org/static/docs/implementing-fault-tolerant-services.pdf

1990 – Efficient Offline Electronic Checks (B. den Boer, D. Chaum, E. van Heyst, S. Mjxlsnes, A. Steenbeek) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1990-Chapter-Efficient-Offline-Electronic-Checks.pdf

1991 – Convertible Undeniable Signatures (D. Chaum, I. Damgard, T. Pedersen) – https://chaum.com/wp-content/uploads/2022/01/Boyar-1991-Chapter-Convertible-Undeniable-Signature.pdf

1991 – Direct Zero Knowledge Proofs Of Computational Power (T. Okamoto, K. Ohta, D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Okamoto-1991-Chapte-Direct-Zero-Knowledge-Proofs-of-Comp-Power.pdf

1991 – Why I Wrote PGP (Philip R. Zimmermann) – https://nakamotoinstitute.org/why-i-wrote-pgp/

1991 – How To Time-Stamp A Digital Document (Stuart Haber, W. Scott Stornetta) – http://www.staroceans.org/e-book/Haber_Stornetta.pdf

1991 – Proofs That Yield Nothing But Their Validity (Oded Goldreich, Silvio Micali, Avi Wigderson) – https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Zero%20Knowledge/Proofs_That_Yield_Nothing_But_Their_Validity_or_All_Languages_in_NP_Have_Zero-Knowledge_Proof_Systems.pdf

1991 – Efficient Broadcast Timestamping (Josh Benaloh, Michael de Mare) – http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.38.9199

1991 – Numbers Can Be Better Form Of Cash Than Paper (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Numbers-can-be-better-form-of-cash.pdf

1991 – Some Weaknesses Of Weaknesses Of Undeniable Signatures (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1991-Chapter-Some-Weaknesses-Of-Weaknesses-Of-Undeniable-Signatures.pdf

1991 – Undeniable Signatures (D. Chaum, H. van Antwerpen) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Antwerpen-1990-Chapter-Undeniable-Signatures.pdf

1992 – Provably Unforgeable Signatures (D. Chaum, J. Bos) – https://chaum.com/wp-content/uploads/2022/01/Bos-Chaum-1993-Chapter-Provably-Unforgeable-Signatures.pdf

1992 – Transferred Cash Grows In Size (D. Chaum, T.P. Pedersen) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Pedersen-1993-Chapter-Transferred-Cash-Grows-in-Size.pdf

1992 – Wallet Databases With Observers (D. Chaum, T.P. Pedersen) – https://chaum.com/wp-content/uploads/2021/12/Wallet_Databases.pdf

1992 – Improving The Efficiency & Reliability Of Digital Time-Stamping (W. Scott Stornetta, Dave Bayer, Stuart Haber) – https://www.math.columbia.edu/~bayer/papers/Timestamp_BHS93.pdf

1992 – Libertaria In Cyberspace (Timothy C. May) – https://nakamotoinstitute.org/libertaria-in-cyberspace/

1992 – Crypto Glossary (Timothy C. May, Eric Hughes) – https://nakamotoinstitute.org/crypto-glossary/

1992 – Achieving Electronic Privacy (D. Chaum, Scientific American) – https://chaum.com/wp-content/uploads/2021/12/ScientificAmerican-AEP.pdf

1992 – Cryptographically Strong Undeniable Signatures, Unconditionally Secure (D. Chaum, E. van Heijst, B. Pfitzmann) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1992-Chapter-Cryptographically-Strong-Undeniable-Signatures.pdf

1992 – Pricing Via Processing Or Combatting Junk Mail (Dwork, Naor) – https://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf

1993 – Crypto Rebels (Wired) – https://www.wired.com/1993/02/crypto-rebels/

1993 – Prepaid Smart Card Techniques: A Brief Introduction & Comparison (D.Chaum) – https://chaum.com/prepaid-smart-card-techniques/

1993 – Race Integrity Primitives Evaluation (Preneel, Bart, D. Chaum, W. Fumy, C. Jansen, P. Landrock, G. Roelofsen) – https://chaum.com/wp-content/uploads/2022/01/RaceIntegrityPrimitives.pdf

1993 – Digital Cash & Privacy (Hal Finney) – https://nakamotoinstitute.org/digital-cash-and-privacy/

1993 – A Cypherpunk’s Manifesto (Eric Hughes) – https://www.activism.net/cypherpunk/manifesto.html

1993 – Detecting Double Spending (Hal Finney) – https://nakamotoinstitute.org/detecting-double-spending/

1994 – Digicash: World’s First Electronic Cash Payment Over Computer Networks (David Chaum) – https://chaum.com/wp-content/uploads/2022/01/05-27-94-World_s-first-electronic-cash-payment-over-computer-networks.pdf

1994 – E-Money That’s What I Want (Wired, David Chaum) – https://chaum.com/wp-content/uploads/2022/01/12-01-1994-E-Money-That_s-What-I-Want.pdf

1994 – For-Pay Remailers (Hal Finney) – http://web.archive.org/web/20140306124328/finney.org/~hal/pay_remail.html

1994 – PGP Web Of Trust Misconceptions (Hal Finney) – https://web.archive.org/web/20130513043904/http://finney.org/~hal/web_of_trust.html

1994 – The Cyphernomicron (Timothy May) – https://nakamotoinstitute.org/static/docs/cyphernomicon.txt

1994 – Cyberspace, Crypto Anarchy & Pushing Limits (Timothy May) – https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-pushing-limits.txt

1994 – Crypto Anarchy & Virtual Communities (Timothy May) – https://nakamotoinstitute.org/virtual-communities/

1994 – Smart Contracts (Nick Szabo) – https://nakamotoinstitute.org/smart-contracts/

1994 – Smart Liens (Nick Szabo) – https://nakamotoinstitute.org/smart-liens/

1995 – Smart Contracts Glossary (Nick Szabo) – http://web.archive.org/web/20160417212209/http://szabo.best.vwh.net/smart_contracts_glossary.html

1995 – Digital Cash & The Development Of The Apolitical Currency (John Michael, Makoto Dykes) – https://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall95-papers/dykes-cash.html

1996 – A Declaration Of The Independence of Cyberspace (John Perry Barlow) – https://www.eff.org/cyberspace-independence

1996 – How to make a mint: The Cryptography of anonymous electronic cash (Laurie Law, Susan Sabett, Jerry Solinas) – https://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm

1996 – Negative Reputations (Nick Szabo) – https://nakamotoinstitute.org/negative-reputations/

1997 – Secure Names For Bit-Strings (Stuart Haber, W. Scott Stornetta) – https://nakamotoinstitute.org/static/docs/secure-names-bit-strings.pdf

1997 – Formalizing & Securing Relationships On Public Networks (Nick Szabo) – https://nakamotoinstitute.org/formalizing-securing-relationships/

1997 – Contracts With Bearer (Nick Szabo) – https://nakamotoinstitute.org/contracts-with-bearer/

1997 – Distributing Authorities & Verifying Their Claims (Nick Szabo) – https://nakamotoinstitute.org/distributing-authorities-and-verifying-their-claims/

1997 – The Idea Of Smart Contracts (Nick Szabo) – https://nakamotoinstitute.org/the-idea-of-smart-contracts/

1997 – Coins, Notes & Bites: The Case For Legal Tender On The Internet (Joshua B. Konvisser) – https://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech321.pdf

1997 – Component Architecture For General Ledgers (Boyle, T.F. GLT, GLR) – https://linas.org/mirrors/www.gldialtone.com/2001.07.14/GLT-GLR.htm

1997 – A Partial Hash Collision Based Postage Scheme (Adam Back) – http://www.hashcash.org/papers/announce.txt

1997 – Auditable Metering & Lightweight Security (Franklin, M.K., Malkhi, D.) – http://www.hashcash.org/papers/auditable-metering.pdf

1998 – Curbing Junk E-mail Via Secure Classification (E. Gabber, M. Jakobsson, Y. Matias, A. Mayer) – http://www.hashcash.org/papers/secure-classification.pdf

1998 – B-Money (Wei Dai) – http://www.weidai.com/bmoney.txt

1998 – Some Timestamping Protocol Failures (Just, M.) – https://www.researchgate.net/publication/2487834_Some_Timestamping_Protocol_Failures

1998 – Confidential Auditing (Nick Szabo) – https://nakamotoinstitute.org/confidential-auditing/

1998 – Secure Property Titles With Owner Authority (Nick Szabo) – https://nakamotoinstitute.org/secure-property-titles/

1998 – The Geodesic Market (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#the-geodesic-market

1998 – Digital Bearer Settlement (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-settlement

1998 – Homesteading the Noosphere (Eric Steven Raymond) – http://www.catb.org/esr/writings/homesteading/homesteading/

1998 – How To Underwrite A Digital Bearer Security (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#how-to-underwrite-a-digital-bearer-security

1998 – Digital Bearer Bonds (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-bonds

1998 – Digital Bearer Equity (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-equity

1998 – Digital Bearer Derivatives (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-derivatives

1998 – Digital Bearer Micropayment (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-micropayment

1999 – Deploying Digital Bearer Transaction (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-transactions

1999 – Internet Bearer Underwriting (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#internet-bearer-underwriting

1999 – How To Build A Bearer Underwriting Revenue Model (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#endpiece

1999 – How Will Regulators Work In The New Net Economy? (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#regulators-in-the-net-economy

1999 – Divine Providence: Internet Content Without Transfer Pricing (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#divine-providence

1999 – The Geodesic Economy (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#the-geodesic-economy

1999 – Practical Byzantine Fault Tolerance (Castro, M., Liskov, B.) – http://pmg.csail.mit.edu/papers/osdi99.pdf

1999 – Micropayments & Mental Transaction Costs (Nick Szabo) – https://nakamotoinstitute.org/static/docs/micropayments-and-mental-transaction-costs.pdf

1999 – Intrapolynomial Cryptography (Nick Szabo) – https://nakamotoinstitute.org/intrapolynomial-cryptography/

1999 – Design Of A Secure Timestamping Service With Minimal Trust Requirements (Xavier Serret-Avila, Jean-Jacques Quisquater, Henri Massias) – https://nakamotoinstitute.org/static/docs/secure-timestamping-service.pdf

1999 – The God Protocols (Nick Szabo) – https://nakamotoinstitute.org/the-god-protocols/

1999 – The Data Encryption Standard (U.S. Department Of Commerce) – https://csrc.nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf

1999 – Proofs Of Work & Bread Pudding Protocols (Jakobsson, M., Juels, A.) –  http://www.hashcash.org/papers/bread-pudding.pdf

1999 – Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (Juels, A., Brainard, J.) – https://www.researchgate.net/publication/221655418_Client_Puzzles_A_Cryptographic_Countermeasure_Against_Connection_Depletion_Attacks

2000 – Mechanism Theory (Matthew O. Jackson) – https://web.stanford.edu/~jacksonm/mechtheo.pdf

2000 – The Cathedral and the Bazaar (Eric Steven Raymond) – http://www.catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/

2000 – Contracts In Cyberspace (David D. Friedman) – http://www.daviddfriedman.com/Academic/contracts_in_%20cyberspace/contracts_in_cyberspace.htm

2000 – A Pseudonymous Communications Infrastructure For The Internet (Ian Avrum Goldberg) – https://www.cypherpunks.ca/~iang/pubs/thesis-final.pdf

2000 – Designing Trusted Services With Group Controls (Nick Szabo) – https://nakamotoinstitute.org/designing-trusted-services-with-group-controls/

2000 – Capability-based Financial Instruments (Mark S. Miller, Bill Frantz, Chip Morningstar) – http://www.erights.org/elib/capability/ode/index.html

2000 – Financial Cryptography In 7 Layers (Ian Grigg) – https://nakamotoinstitute.org/financial-cryptography-in-7-layers/

2001 – Paxos Made Simple (Lamport, L.) – http://lamport.azurewebsites.net/pubs/paxos-simple.pdf

2001 – Constructing elliptic curves with given number of points over finite field (Amod Agashe, Kristin Lauter,Ramarathnam Venkatesan) – https://www.microsoft.com/en-us/research/publication/constructing-elliptic-curves-with-a-given-number-of-points-over-a-finite-field/

2001 – Trusted Third Parties Are Security Holes (Nick Szabo) – https://nakamotoinstitute.org/trusted-third-parties/

2001 – Hash Cash (Adam Back) – https://web.archive.org/web/20010614013848/http://cypherspace.org/hashcash/

2002 – Hashcash – A Denial of Service Counter-Measure (Adam Back) – http://www.hashcash.org/papers/hashcash.pdf

2002 – The Sybil Attack (John R. Douceur) – https://www.microsoft.com/en-us/research/wp-content/uploads/2002/01/IPTPS2002.pdf

2002 – Improving Time Stamping Schemes: A Distributed Point of View (Kaouther Blibech, Alexis Bonnecaze, Alban Gabillon, Pierre Liardet) – http://pages.upf.pf/Alban.Gabillon/articles/AnnalTelecom.pdf

2002 – Securing Passwords Against Dictionary Attacks (Pinkas, B., Sander, T.) – https://www.researchgate.net/publication/2904347_Securing_Passwords_Against_Dictionary_Attacks

2002 – The Playdough Protocols (Nick Szabo) – https://nakamotoinstitute.org/the-playdough-protocols/

2002 – A Formal Language For Analyzing Contracts (Nick Szabo) – https://nakamotoinstitute.org/contract-language/

2003 – Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption (Jean-Sebastien Coron, David Naccache – https://iacr.org/archive/asiacrypt2003/11_Session10/24_063/28940395.pdf

2003 – Fast Elliptic Curve Arithmetic & Improved Weil Pairing Evaluation (Kirsten Eisenträger, Kristin Lauter, Peter Montgomery) – https://www.microsoft.com/en-us/research/publication/fast-elliptic-curve-arithmetic-and-improved-weil-pairing-evaluation-2/

2003 – Advances In Distributed Security (Nick Szabo) – https://nakamotoinstitute.org/advances-in-distributed-security/

2003 – KARMA: A Secure Economic Framework For P2P Resource Sharing (Vishnumurthy, S., Chandrakumar, S., Sirer, E.G.) – https://www.cs.cornell.edu/people/egs/papers/karma.pdf

2003 – Names: Decentralized, Secure, Human-Meaningful: Choose Two (Zooko) – https://web.archive.org/web/20120204172516/http://zooko.com/distnames.html

2004 – Original Code & Website For Hal Finney’s Reusable Proofs of Work – https://nakamotoinstitute.org/finney/rpow/

2004 – Scarce Objects (Nick Szabo) – https://nakamotoinstitute.org/scarce-objects/

2004 – The Ricardian Contract (Ian Grigg) – https://iang.org/papers/ricardian_contract.html

2005 – An Introduction To Petname Systems (Marc Stiegler) – https://web.archive.org/web/20120204092248/http://www.skyhunter.com/marcs/petnames/IntroPetNames.html

2005 – Diffie-Hellman Key Exchange – A Non-Mathematician’s Explanation (Keith Palmgren) – https://community.cisco.com/legacyfs/online/legacy/3/5/6/26653-dh.PDF

2005 – P2P Filename Integrity (Nick Szabo) – https://nakamotoinstitute.org/p2p-filename-integrity/

2005 – Bit Gold (Nick Szabo) – https://nakamotoinstitute.org/bit-gold/

2005 – One-Way Signature Chaining – A New Paradigm For Group Cryptosystems (Amitabh Saxena, Ben Soh) – https://eprint.iacr.org/2005/335.pdf

2005 – The Case For Privacy (David D. Friedman) – https://nakamotoinstitute.org/the-case-for-privacy/

2005 – From Imperial China To Cyberspace (David D. Friedman) – http://www.daviddfriedman.com/Academic/Course_Pages/analytical_methods_08/china_to_cyberspace.htm

2005 – Triple Entry Accounting (Ian Grigg) – https://iang.org/papers/triple_entry.html

2005 – On Digital Cash-Like Payment Systems (Daniel A. Nagy) – https://nakamotoinstitute.org/static/docs/on-digital-cash-like-payment-systems.pdf

2005 – Exposing Computationally-Challenged Byzantine Impostors (James Aspnes, Collin Jackson, Arvind Krishnamurthy) – http://cs.yale.edu/publications/techreports/tr1332.pdf

2006 – Understanding Churn in Peer-to-Peer Networks (Daniel Stutzbach, Reza Rejaie) – http://www.barsoom.org/papers/imc-2006-churn.pdf

2006 – RSA Cryptosystem (Silvia Robles) – https://dspace.mit.edu/bitstream/handle/1721.1/100853/18-304-spring-2006/contents/projects/rsa_robles.pdf

2008 – Truledger In Plain English (Bill St. Clair) – https://nakamotoinstitute.org/truledger/

2008 – Lucre: Anonymous Electronic Tokens v1.8 (Ben Laurie) – https://nakamotoinstitute.org/static/docs/lucre.pdf

2008 – Bit Gold (Szabo, N.) – https://unenumerated.blogspot.com/2005/12/bit-gold.html

2008 – Elliptic Curve Discrete Logarithm Problem & Equivalent Hard Problems for Elliptic Divisibility Sequences (Kristin Lauter, Katherine Stange) – https://www.microsoft.com/en-us/research/publication/the-elliptic-curve-discrete-logarithm-problem-and-equivalent-hard-problems-for-elliptic-divisibility-sequences/

2008 – cMix: Mixing With Minimal Real-Time Asymmetric Cryptographic Operations (D. Chaum, D. Das, F. Javani, A. Kate, A. Krasnova, J. de Ruiter, A. Sherman) – https://eprint.iacr.org/2016/008.pdf

2009 – Accessible Voter-Verifiability (D. Chaum, B. Hosp, S. Popoveniuc, P. L. Vora) – https://chaum.com/wp-content/uploads/2021/12/AccessibleVoterVerifiability.pdf

2009 – Compact E-Cash & Simulatable VRFs Revisited (Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya) – https://www.microsoft.com/en-us/research/publication/compact-e-cash-and-simulatable-vrfs-revisited/

2011 – Introduction to Distributed System Design (Google Code University) – https://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html

2011 – Perspectives on the CAP Theorem (Seth Gilbert, Nancy A. Lynch) – https://groups.csail.mit.edu/tds/papers/Gilbert/Brewer2.pdf

2012 – Homomorphic Payment Addresses and the Pay-to-Contract Protocol (Ilja Gerhardt, Timo Hanke) – https://arxiv.org/pdf/1212.3257v1.pdf

2012 – GPG Contracts (Mircea Popescu) – https://nakamotoinstitute.org/mempool/gpg-contracts

2012 – How RSA Works With Examples (Doctrina) – https://doctrina.org/How-RSA-Works-With-Examples.html

2013 – Public-Key Cryptography (Daniel Krawisz) – https://nakamotoinstitute.org/mempool/crypto-anarchy-and-libertarian-entrepreneurship-2/

2013 – The Proof-of-Work Concept (Daniel Krawisz) – https://nakamotoinstitute.org/mempool/the-proof-of-work-concept/

2013 – Real Crypto-Anarchy Without Anonymity (Oleg Andreev) – https://blog.oleganza.com/post/71410377996/real-crypto-anarchy-without-anonymity

2013 – The Log: What every software engineer should know about real-time data’s unifying abstraction (Jay Kreps) – https://engineering.linkedin.com/distributed-systems/log-what-every-software-engineer-should-know-about-real-time-datas-unifying

2014 – Analysis of Hashrate-Based Double Spending (Meni Rosenfeld) – https://arxiv.org/abs/1402.2009

2014 – Proof That Proof-of-Work is the Only Solution to the Byzantine Generals’ Problem (Oleg Andreev) – https://gist.github.com/oleganza/8cc921e48f396515c6d6A Graduate Course in Applied Cryptography – https://toc.cryptobook.us/

Thanks for reading!

Browse Topics

  • Artificial Intelligence
    • Adversarial Attacks & Examples
    • Alignment & Ethics
    • Backdoor & Trojan Attacks
    • Federated Learning
    • Model Extraction
    • Prompt Injection & Jailbreaking
    • Watermarking
  • Biotech & Agtech
  • Commodities
    • Agricultural
    • Energies & Energy Metals
    • Gases
    • Gold
    • Industrial Metals
    • Minerals & Metalloids
  • Economics
  • Management
  • Marketing
  • Philosophy
  • Robotics
  • Sociology
    • Group Dynamics
    • Political Science
    • Religious Sociology
    • Sociological Theory
  • Web3 Studies
    • Bitcoin & Cryptocurrencies
    • Blockchain & Cryptography
    • DAOs & Decentralized Organizations
    • NFTs & Digital Identity

Recent Posts

  • A History Of AI Jailbreaking Attacks

    A History Of AI Jailbreaking Attacks

    June 7, 2025
  • A List Of AI Prompt Injection And Jailbreaking Attack Resources

    A List Of AI Prompt Injection And Jailbreaking Attack Resources

    June 7, 2025
  • What Is AutoAttack? Evaluating Adversarial Robustness

    What Is AutoAttack? Evaluating Adversarial Robustness

    June 7, 2025
©2025 Brian D. Colwell | Theme by SuperbThemes