The Big List Of Cryptography Resources is organized in chronological order. Enjoy!
1957 – An Introduction To Probability Theory & Its Applications, Vol. I (William Feller) – https://bitcoinwords.github.io/assets/papers/an-introduction-to-probability-theory-and-its-applications.pdf
1970 – Public-Key Cryptography Discovered At GCHQ In Secret (James Ellis) – https://ethw.org/Milestones:Invention_of_Public-key_Cryptography,_1969_-_1975#:~:text=At%20Great%20Britain’s%20Government%20Communications,key%20cryptography’%20could%20be%20achieved.
1973 – RSA Cryptosystem Discovered At GCHQ In Secret (Clifford Cocks) – https://www.techtarget.com/searchsecurity/definition/RSA#:~:text=RSA%20was%20first%20publicly%20described,U.K.’s%20GCHQ%20until%201997
1974 – A Protocol for Packet Network Intercommunication (Cerf, Khan) – https://bitcoinstan.io/prehistory/doc/1974.pdf
1976 – Public-key Cryptography Discovered At Stanford (Diffie, Hellman) – https://groups.csail.mit.edu/mac/classes/6.001/ST98/psets/ps2web/ps2-elgamal/node1.html
1976 – New Directions In Cryptography (Whitfield Diffie, Martin Hellman) – https://ee.stanford.edu/~hellman/publications/24.pdf
1977 – A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (R.L. Rivest, A. Shamir, L. Adleman) – https://people.csail.mit.edu/rivest/Rsapaper.pdf
1978 – Protocols For Public Key Cryptosystems (Ralph C. Merkle) – https://www.ralphmerkle.com/papers/Protocols.pdf
1978 – Secure Communications Over Insecure Channels (Ralph C. Merkle) – https://nakamotoinstitute.org/static/docs/secure-communications-insecure-channels.pdf
1978 – An Overview of Public Key Cryptography (Martin E. Hellman) – https://ee.stanford.edu/~hellman/publications/31.pdf
1978 – Implementating Capability Based Protection Using Encryption (D. Chaum, R.S. Fabry) – https://chaum.com/wp-content/uploads/2022/02/Implementing-capability-based-protection-using-encryption.pdf
1979 – Computer Systems Established, Maintained & Trusted By Mutually Suspicious Groups (D. Chaum) – https://chaum.com/wp-content/uploads/2022/02/techrep.pdf + 1982 dissertation – https://chaum.com/wp-content/uploads/2022/02/chaum_dissertation.pdf
1979 – Secrecy, Authentication & Public Key Systems (Ralph C. Merkle) – https://nakamotoinstitute.org/static/docs/secrecy-authentication-and-public-key-systems.pdf
1980 – Protocols For Public Key Cryptosystems (Merkle, R.C.) – https://www.ralphmerkle.com/papers/Protocols.pdf
1981 – Silo Watching (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Silo-Watching.pdf
1981 – Untraceable Electronic Mail, Return Addresses & Digital Pseudonyms (D. Chaum) – https://chaum.com/wp-content/uploads/2021/12/chaum-mix.pdf + tech report
1982 – The Byzantine Generals Problem (Marshall Pease, Robert Shostak, Leslie Lamport) – https://lamport.azurewebsites.net/pubs/pubs.html?from=https://research.microsoft.com/en-us/um/people/lamport/pubs/pubs.html&type=path#byz
1982 – Design Concepts For Tamper-Responding Systems (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Design-Concepts-for-Tamper-Responding-Systems.pdf
1982 – Blind Signatures For Untraceable Payments (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-blind-signatures.pdf
Unpublished – Grassroots Democracy (D. Chaum) – https://chaum.com/wp-content/uploads/2022/09/7th-Estate-PDF.pdf
1984 – A New Paradigm For Individuals In The Information Age (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-New-Paradigm-for-Individuals-in-Information-Age.pdf
1984 – Reflections On Trusting Trust (Ken Thompson) – https://dl.acm.org/doi/10.1145/358198.358210 & https://nakamotoinstitute.org/static/docs/reflections-on-trusting-trust.pdf
1985 – Security Without Identification – Card Computers To Make Big Brother Obsolete (David Chaum) – https://www.chaum.com/publications/Security_Wthout_Identification.html
1985 – Elliptic curve cryptography: The serpentine course of a paradigm shift (Koblitz, Menezes) – https://bitcoinstan.io/prehistory/doc/1985.pdf
1985 – Extensible Partial Key, Key Safeguarding & Threshold Systems (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum1985-Chapter-How-To-Keep-a-Secret-Alive.pdf
1986 – Some Variations On RSA Signatures & Their Security (D. Chaum, W. de Jonge) – https://chaum.com/wp-content/uploads/2022/01/Jonge-Chaum-1987-Chapter-Some-Variations-On-RSA-Signatures.pdf
1986 – Attacks On Some RSA Signature Schemes (D. Chaum, W. de Jonge) – https://chaum.com/wp-content/uploads/2022/01/Jonge-Chaum-1986-Chapter-Attacks-on-Some-RSA-Signatures.pdf
1986 – Demonstrating Public Predicate Can Be Satisfied Without Revealing Information About How (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1987-Chapter-Demonstrating-That-a-Public-Predicate-Can-Be-Satisfied.pdf
1986 – Cryptanalysis Of DES With Reduced Number Of Rounds (D. Chaum, J.H. Evertse) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Evertse-1986-Chapter-Cryptanalysis-of-DES-With-a-Reduced.pdf
1987 – From Crossbows To Cryptography: Techno-Thwarting The State (Chuck Hammill) – https://nakamotoinstitute.org/from-crossbows-to-cryptography/
1987 – A Secure & Privacy-Protecting Protocol For Transmitting Personal Information Between Organizations (D. Chaum, J.H. Evertse) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Evertse-1987-Chapter-A-Secure-and-Privacy-Protecting-Protocol.pdf
1987 – Demonstrating Possession Of Discrete Log Without Revealing It (D. Chaum, J.H. Evertse, J. van de Graaf, R. Peralta) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1987-Chapter-Demonstrating-Possession-of-a-Discrete-Log.pdf
1987 – Blinding For Unanticipated Signatures (D. Chaum, W.L. Price) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1988-Chapter-Blinding-For-Unanticipated-Signatures.pdf
1987 – Multiparty Computations Ensuring Secrecy Of Each Party’s Input & Correctness Of Result (D. Chaum, I.B. Damgerd, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/multiparty_computation.pdf
1988 – Untraceable Electronic Cash (D. Chaum, A. Fiat, M. Naor) – https://chaum.com/wp-content/uploads/2021/12/Untraceable_Electronic_Cash.pdf
1988 – Untraceable Electronic Mail, Return Addresses & Digital Pseudonyms (David Chaum) – https://nakamotoinstitute.org/static/docs/untraceable-electronic-mail.pdf
1988 – The Dining Cryptographers Problem: Unconditional Sender Untraceability (D. Chaum as guest) – https://chaum.com/wp-content/uploads/2022/01/chaum-dc.pdf
1988 – The Crypto Anarchist Manifesto – (Timothy May) – https://activism.net/cypherpunk/crypto-anarchy.html
1988 – Improved Protocol For Demonstrating Possession Of Discrete Logarithm (D. Chaum, J.H. Evertse, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1988-Chapter-An-Improved-Protocol-For-Demonstrating.pdf
1988 – Gradual & Verifiable Release Of A Secret (E.F. Brickell, D. Chaum, I.B. Damgerd, J. van de Graaf) – https://chaum.com/wp-content/uploads/2022/01/Brickell1988-Chapter-Gradual-and-Verifiable-Release-of-a-Secret.pdf
1988 – Minimum Disclosure Proofs Of Knowledge (G. Brassard, D. Chaum, C. Crepeau) – https://chaum.com/wp-content/uploads/2021/12/Minimum_Disclosure_Proofs_of_Knowledge.pdf
1988 – Multiparty Unconditionally Secure Protocols (D. Chaum, C. Crhpeau, I. Damgerd) – https://chaum.com/wp-content/uploads/2021/12/Multiparty_unconditionally_secure_protocols.pdf
1989 – The Part-time Parliament. Digital Equipment Corp (Lamport, L.) – https://lamport.azurewebsites.net/pubs/lamport-paxos.pdf
1989 – Online Cash Checks (David Chaum) – https://nakamotoinstitute.org/online-cash-checks/
1989 – The Spymasters Double Agent Problem (D. Chaum) – https://chaum.com/wp-content/uploads/2021/12/spymasters_double_agent_problem.pdf
1989 – Privacy Protected Payments: Unconditional Payer & Payee Untraceability (D. Chaum) – https://chaum.com/wp-content/uploads/2022/02/Privacy-protected-payments-unconditioanal….pdf
1989 – Untraceable Electronic Cash with Digicash (Waleed Abrar) – https://bitcoinstan.io/prehistory/doc/1989.pdf
1990 – Unconditionally-Secure Digital Signatures (D. Chaum, S. Roijakkers) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Roijakkers-1991-Chapter-Unconditionally-Secure-Digital-Signatures.pdf
1990 – Zero-Knowledge Undeniable Signatures (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1991-Chapter-Zero-Knowledge-Undeniable-Signatures.pdf
1990 – Implementing Fault-Tolerant Services Using State Machine Approach (Fred B. Schneider) – https://nakamotoinstitute.org/static/docs/implementing-fault-tolerant-services.pdf
1990 – Efficient Offline Electronic Checks (B. den Boer, D. Chaum, E. van Heyst, S. Mjxlsnes, A. Steenbeek) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1990-Chapter-Efficient-Offline-Electronic-Checks.pdf
1991 – Convertible Undeniable Signatures (D. Chaum, I. Damgard, T. Pedersen) – https://chaum.com/wp-content/uploads/2022/01/Boyar-1991-Chapter-Convertible-Undeniable-Signature.pdf
1991 – Direct Zero Knowledge Proofs Of Computational Power (T. Okamoto, K. Ohta, D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Okamoto-1991-Chapte-Direct-Zero-Knowledge-Proofs-of-Comp-Power.pdf
1991 – Why I Wrote PGP (Philip R. Zimmermann) – https://nakamotoinstitute.org/why-i-wrote-pgp/
1991 – How To Time-Stamp A Digital Document (Stuart Haber, W. Scott Stornetta) – http://www.staroceans.org/e-book/Haber_Stornetta.pdf
1991 – Proofs That Yield Nothing But Their Validity (Oded Goldreich, Silvio Micali, Avi Wigderson) – https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Zero%20Knowledge/Proofs_That_Yield_Nothing_But_Their_Validity_or_All_Languages_in_NP_Have_Zero-Knowledge_Proof_Systems.pdf
1991 – Efficient Broadcast Timestamping (Josh Benaloh, Michael de Mare) – http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.38.9199
1991 – Numbers Can Be Better Form Of Cash Than Paper (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Numbers-can-be-better-form-of-cash.pdf
1991 – Some Weaknesses Of Weaknesses Of Undeniable Signatures (D. Chaum) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1991-Chapter-Some-Weaknesses-Of-Weaknesses-Of-Undeniable-Signatures.pdf
1991 – Undeniable Signatures (D. Chaum, H. van Antwerpen) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Antwerpen-1990-Chapter-Undeniable-Signatures.pdf
1992 – Provably Unforgeable Signatures (D. Chaum, J. Bos) – https://chaum.com/wp-content/uploads/2022/01/Bos-Chaum-1993-Chapter-Provably-Unforgeable-Signatures.pdf
1992 – Transferred Cash Grows In Size (D. Chaum, T.P. Pedersen) – https://chaum.com/wp-content/uploads/2022/01/Chaum-Pedersen-1993-Chapter-Transferred-Cash-Grows-in-Size.pdf
1992 – Wallet Databases With Observers (D. Chaum, T.P. Pedersen) – https://chaum.com/wp-content/uploads/2021/12/Wallet_Databases.pdf
1992 – Improving The Efficiency & Reliability Of Digital Time-Stamping (W. Scott Stornetta, Dave Bayer, Stuart Haber) – https://www.math.columbia.edu/~bayer/papers/Timestamp_BHS93.pdf
1992 – Libertaria In Cyberspace (Timothy C. May) – https://nakamotoinstitute.org/libertaria-in-cyberspace/
1992 – Crypto Glossary (Timothy C. May, Eric Hughes) – https://nakamotoinstitute.org/crypto-glossary/
1992 – Achieving Electronic Privacy (D. Chaum, Scientific American) – https://chaum.com/wp-content/uploads/2021/12/ScientificAmerican-AEP.pdf
1992 – Cryptographically Strong Undeniable Signatures, Unconditionally Secure (D. Chaum, E. van Heijst, B. Pfitzmann) – https://chaum.com/wp-content/uploads/2022/01/Chaum-1992-Chapter-Cryptographically-Strong-Undeniable-Signatures.pdf
1992 – Pricing Via Processing Or Combatting Junk Mail (Dwork, Naor) – https://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf
1993 – Crypto Rebels (Wired) – https://www.wired.com/1993/02/crypto-rebels/
1993 – Prepaid Smart Card Techniques: A Brief Introduction & Comparison (D.Chaum) – https://chaum.com/prepaid-smart-card-techniques/
1993 – Race Integrity Primitives Evaluation (Preneel, Bart, D. Chaum, W. Fumy, C. Jansen, P. Landrock, G. Roelofsen) – https://chaum.com/wp-content/uploads/2022/01/RaceIntegrityPrimitives.pdf
1993 – Digital Cash & Privacy (Hal Finney) – https://nakamotoinstitute.org/digital-cash-and-privacy/
1993 – A Cypherpunk’s Manifesto (Eric Hughes) – https://www.activism.net/cypherpunk/manifesto.html
1993 – Detecting Double Spending (Hal Finney) – https://nakamotoinstitute.org/detecting-double-spending/
1994 – Digicash: World’s First Electronic Cash Payment Over Computer Networks (David Chaum) – https://chaum.com/wp-content/uploads/2022/01/05-27-94-World_s-first-electronic-cash-payment-over-computer-networks.pdf
1994 – E-Money That’s What I Want (Wired, David Chaum) – https://chaum.com/wp-content/uploads/2022/01/12-01-1994-E-Money-That_s-What-I-Want.pdf
1994 – For-Pay Remailers (Hal Finney) – http://web.archive.org/web/20140306124328/finney.org/~hal/pay_remail.html
1994 – PGP Web Of Trust Misconceptions (Hal Finney) – https://web.archive.org/web/20130513043904/http://finney.org/~hal/web_of_trust.html
1994 – The Cyphernomicron (Timothy May) – https://nakamotoinstitute.org/static/docs/cyphernomicon.txt
1994 – Cyberspace, Crypto Anarchy & Pushing Limits (Timothy May) – https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-pushing-limits.txt
1994 – Crypto Anarchy & Virtual Communities (Timothy May) – https://nakamotoinstitute.org/virtual-communities/
1994 – Smart Contracts (Nick Szabo) – https://nakamotoinstitute.org/smart-contracts/
1994 – Smart Liens (Nick Szabo) – https://nakamotoinstitute.org/smart-liens/
1995 – Smart Contracts Glossary (Nick Szabo) – http://web.archive.org/web/20160417212209/http://szabo.best.vwh.net/smart_contracts_glossary.html
1995 – Digital Cash & The Development Of The Apolitical Currency (John Michael, Makoto Dykes) – https://groups.csail.mit.edu/mac/classes/6.805/student-papers/fall95-papers/dykes-cash.html
1996 – A Declaration Of The Independence of Cyberspace (John Perry Barlow) – https://www.eff.org/cyberspace-independence
1996 – How to make a mint: The Cryptography of anonymous electronic cash (Laurie Law, Susan Sabett, Jerry Solinas) – https://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm
1996 – Negative Reputations (Nick Szabo) – https://nakamotoinstitute.org/negative-reputations/
1997 – Secure Names For Bit-Strings (Stuart Haber, W. Scott Stornetta) – https://nakamotoinstitute.org/static/docs/secure-names-bit-strings.pdf
1997 – Formalizing & Securing Relationships On Public Networks (Nick Szabo) – https://nakamotoinstitute.org/formalizing-securing-relationships/
1997 – Contracts With Bearer (Nick Szabo) – https://nakamotoinstitute.org/contracts-with-bearer/
1997 – Distributing Authorities & Verifying Their Claims (Nick Szabo) – https://nakamotoinstitute.org/distributing-authorities-and-verifying-their-claims/
1997 – The Idea Of Smart Contracts (Nick Szabo) – https://nakamotoinstitute.org/the-idea-of-smart-contracts/
1997 – Coins, Notes & Bites: The Case For Legal Tender On The Internet (Joshua B. Konvisser) – https://jolt.law.harvard.edu/articles/pdf/v10/10HarvJLTech321.pdf
1997 – Component Architecture For General Ledgers (Boyle, T.F. GLT, GLR) – https://linas.org/mirrors/www.gldialtone.com/2001.07.14/GLT-GLR.htm
1997 – A Partial Hash Collision Based Postage Scheme (Adam Back) – http://www.hashcash.org/papers/announce.txt
1997 – Auditable Metering & Lightweight Security (Franklin, M.K., Malkhi, D.) – http://www.hashcash.org/papers/auditable-metering.pdf
1998 – Curbing Junk E-mail Via Secure Classification (E. Gabber, M. Jakobsson, Y. Matias, A. Mayer) – http://www.hashcash.org/papers/secure-classification.pdf
1998 – B-Money (Wei Dai) – http://www.weidai.com/bmoney.txt
1998 – Some Timestamping Protocol Failures (Just, M.) – https://www.researchgate.net/publication/2487834_Some_Timestamping_Protocol_Failures
1998 – Confidential Auditing (Nick Szabo) – https://nakamotoinstitute.org/confidential-auditing/
1998 – Secure Property Titles With Owner Authority (Nick Szabo) – https://nakamotoinstitute.org/secure-property-titles/
1998 – The Geodesic Market (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#the-geodesic-market
1998 – Digital Bearer Settlement (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-settlement
1998 – Homesteading the Noosphere (Eric Steven Raymond) – http://www.catb.org/esr/writings/homesteading/homesteading/
1998 – How To Underwrite A Digital Bearer Security (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#how-to-underwrite-a-digital-bearer-security
1998 – Digital Bearer Bonds (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-bonds
1998 – Digital Bearer Equity (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-equity
1998 – Digital Bearer Derivatives (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-derivatives
1998 – Digital Bearer Micropayment (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-micropayment
1999 – Deploying Digital Bearer Transaction (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#digital-bearer-transactions
1999 – Internet Bearer Underwriting (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#internet-bearer-underwriting
1999 – How To Build A Bearer Underwriting Revenue Model (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#endpiece
1999 – How Will Regulators Work In The New Net Economy? (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#regulators-in-the-net-economy
1999 – Divine Providence: Internet Content Without Transfer Pricing (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#divine-providence
1999 – The Geodesic Economy (Robert Hettinga) – https://nakamotoinstitute.org/the-geodesic-market/#the-geodesic-economy
1999 – Practical Byzantine Fault Tolerance (Castro, M., Liskov, B.) – http://pmg.csail.mit.edu/papers/osdi99.pdf
1999 – Micropayments & Mental Transaction Costs (Nick Szabo) – https://nakamotoinstitute.org/static/docs/micropayments-and-mental-transaction-costs.pdf
1999 – Intrapolynomial Cryptography (Nick Szabo) – https://nakamotoinstitute.org/intrapolynomial-cryptography/
1999 – Design Of A Secure Timestamping Service With Minimal Trust Requirements (Xavier Serret-Avila, Jean-Jacques Quisquater, Henri Massias) – https://nakamotoinstitute.org/static/docs/secure-timestamping-service.pdf
1999 – The God Protocols (Nick Szabo) – https://nakamotoinstitute.org/the-god-protocols/
1999 – The Data Encryption Standard (U.S. Department Of Commerce) – https://csrc.nist.gov/csrc/media/publications/fips/46/3/archive/1999-10-25/documents/fips46-3.pdf
1999 – Proofs Of Work & Bread Pudding Protocols (Jakobsson, M., Juels, A.) – http://www.hashcash.org/papers/bread-pudding.pdf
1999 – Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks (Juels, A., Brainard, J.) – https://www.researchgate.net/publication/221655418_Client_Puzzles_A_Cryptographic_Countermeasure_Against_Connection_Depletion_Attacks
2000 – Mechanism Theory (Matthew O. Jackson) – https://web.stanford.edu/~jacksonm/mechtheo.pdf
2000 – The Cathedral and the Bazaar (Eric Steven Raymond) – http://www.catb.org/esr/writings/cathedral-bazaar/cathedral-bazaar/
2000 – Contracts In Cyberspace (David D. Friedman) – http://www.daviddfriedman.com/Academic/contracts_in_%20cyberspace/contracts_in_cyberspace.htm
2000 – A Pseudonymous Communications Infrastructure For The Internet (Ian Avrum Goldberg) – https://www.cypherpunks.ca/~iang/pubs/thesis-final.pdf
2000 – Designing Trusted Services With Group Controls (Nick Szabo) – https://nakamotoinstitute.org/designing-trusted-services-with-group-controls/
2000 – Capability-based Financial Instruments (Mark S. Miller, Bill Frantz, Chip Morningstar) – http://www.erights.org/elib/capability/ode/index.html
2000 – Financial Cryptography In 7 Layers (Ian Grigg) – https://nakamotoinstitute.org/financial-cryptography-in-7-layers/
2001 – Paxos Made Simple (Lamport, L.) – http://lamport.azurewebsites.net/pubs/paxos-simple.pdf
2001 – Constructing elliptic curves with given number of points over finite field (Amod Agashe, Kristin Lauter,Ramarathnam Venkatesan) – https://www.microsoft.com/en-us/research/publication/constructing-elliptic-curves-with-a-given-number-of-points-over-a-finite-field/
2001 – Trusted Third Parties Are Security Holes (Nick Szabo) – https://nakamotoinstitute.org/trusted-third-parties/
2001 – Hash Cash (Adam Back) – https://web.archive.org/web/20010614013848/http://cypherspace.org/hashcash/
2002 – Hashcash – A Denial of Service Counter-Measure (Adam Back) – http://www.hashcash.org/papers/hashcash.pdf
2002 – The Sybil Attack (John R. Douceur) – https://www.microsoft.com/en-us/research/wp-content/uploads/2002/01/IPTPS2002.pdf
2002 – Improving Time Stamping Schemes: A Distributed Point of View (Kaouther Blibech, Alexis Bonnecaze, Alban Gabillon, Pierre Liardet) – http://pages.upf.pf/Alban.Gabillon/articles/AnnalTelecom.pdf
2002 – Securing Passwords Against Dictionary Attacks (Pinkas, B., Sander, T.) – https://www.researchgate.net/publication/2904347_Securing_Passwords_Against_Dictionary_Attacks
2002 – The Playdough Protocols (Nick Szabo) – https://nakamotoinstitute.org/the-playdough-protocols/
2002 – A Formal Language For Analyzing Contracts (Nick Szabo) – https://nakamotoinstitute.org/contract-language/
2003 – Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption (Jean-Sebastien Coron, David Naccache – https://iacr.org/archive/asiacrypt2003/11_Session10/24_063/28940395.pdf
2003 – Fast Elliptic Curve Arithmetic & Improved Weil Pairing Evaluation (Kirsten Eisenträger, Kristin Lauter, Peter Montgomery) – https://www.microsoft.com/en-us/research/publication/fast-elliptic-curve-arithmetic-and-improved-weil-pairing-evaluation-2/
2003 – Advances In Distributed Security (Nick Szabo) – https://nakamotoinstitute.org/advances-in-distributed-security/
2003 – KARMA: A Secure Economic Framework For P2P Resource Sharing (Vishnumurthy, S., Chandrakumar, S., Sirer, E.G.) – https://www.cs.cornell.edu/people/egs/papers/karma.pdf
2003 – Names: Decentralized, Secure, Human-Meaningful: Choose Two (Zooko) – https://web.archive.org/web/20120204172516/http://zooko.com/distnames.html
2004 – Original Code & Website For Hal Finney’s Reusable Proofs of Work – https://nakamotoinstitute.org/finney/rpow/
2004 – Scarce Objects (Nick Szabo) – https://nakamotoinstitute.org/scarce-objects/
2004 – The Ricardian Contract (Ian Grigg) – https://iang.org/papers/ricardian_contract.html
2005 – An Introduction To Petname Systems (Marc Stiegler) – https://web.archive.org/web/20120204092248/http://www.skyhunter.com/marcs/petnames/IntroPetNames.html
2005 – Diffie-Hellman Key Exchange – A Non-Mathematician’s Explanation (Keith Palmgren) – https://community.cisco.com/legacyfs/online/legacy/3/5/6/26653-dh.PDF
2005 – P2P Filename Integrity (Nick Szabo) – https://nakamotoinstitute.org/p2p-filename-integrity/
2005 – Bit Gold (Nick Szabo) – https://nakamotoinstitute.org/bit-gold/
2005 – One-Way Signature Chaining – A New Paradigm For Group Cryptosystems (Amitabh Saxena, Ben Soh) – https://eprint.iacr.org/2005/335.pdf
2005 – The Case For Privacy (David D. Friedman) – https://nakamotoinstitute.org/the-case-for-privacy/
2005 – From Imperial China To Cyberspace (David D. Friedman) – http://www.daviddfriedman.com/Academic/Course_Pages/analytical_methods_08/china_to_cyberspace.htm
2005 – Triple Entry Accounting (Ian Grigg) – https://iang.org/papers/triple_entry.html
2005 – On Digital Cash-Like Payment Systems (Daniel A. Nagy) – https://nakamotoinstitute.org/static/docs/on-digital-cash-like-payment-systems.pdf
2005 – Exposing Computationally-Challenged Byzantine Impostors (James Aspnes, Collin Jackson, Arvind Krishnamurthy) – http://cs.yale.edu/publications/techreports/tr1332.pdf
2006 – Understanding Churn in Peer-to-Peer Networks (Daniel Stutzbach, Reza Rejaie) – http://www.barsoom.org/papers/imc-2006-churn.pdf
2006 – RSA Cryptosystem (Silvia Robles) – https://dspace.mit.edu/bitstream/handle/1721.1/100853/18-304-spring-2006/contents/projects/rsa_robles.pdf
2008 – Truledger In Plain English (Bill St. Clair) – https://nakamotoinstitute.org/truledger/
2008 – Lucre: Anonymous Electronic Tokens v1.8 (Ben Laurie) – https://nakamotoinstitute.org/static/docs/lucre.pdf
2008 – Bit Gold (Szabo, N.) – https://unenumerated.blogspot.com/2005/12/bit-gold.html
2008 – Elliptic Curve Discrete Logarithm Problem & Equivalent Hard Problems for Elliptic Divisibility Sequences (Kristin Lauter, Katherine Stange) – https://www.microsoft.com/en-us/research/publication/the-elliptic-curve-discrete-logarithm-problem-and-equivalent-hard-problems-for-elliptic-divisibility-sequences/
2008 – cMix: Mixing With Minimal Real-Time Asymmetric Cryptographic Operations (D. Chaum, D. Das, F. Javani, A. Kate, A. Krasnova, J. de Ruiter, A. Sherman) – https://eprint.iacr.org/2016/008.pdf
2009 – Accessible Voter-Verifiability (D. Chaum, B. Hosp, S. Popoveniuc, P. L. Vora) – https://chaum.com/wp-content/uploads/2021/12/AccessibleVoterVerifiability.pdf
2009 – Compact E-Cash & Simulatable VRFs Revisited (Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya) – https://www.microsoft.com/en-us/research/publication/compact-e-cash-and-simulatable-vrfs-revisited/
2011 – Introduction to Distributed System Design (Google Code University) – https://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html
2011 – Perspectives on the CAP Theorem (Seth Gilbert, Nancy A. Lynch) – https://groups.csail.mit.edu/tds/papers/Gilbert/Brewer2.pdf
2012 – Homomorphic Payment Addresses and the Pay-to-Contract Protocol (Ilja Gerhardt, Timo Hanke) – https://arxiv.org/pdf/1212.3257v1.pdf
2012 – GPG Contracts (Mircea Popescu) – https://nakamotoinstitute.org/mempool/gpg-contracts
2012 – How RSA Works With Examples (Doctrina) – https://doctrina.org/How-RSA-Works-With-Examples.html
2013 – Public-Key Cryptography (Daniel Krawisz) – https://nakamotoinstitute.org/mempool/crypto-anarchy-and-libertarian-entrepreneurship-2/
2013 – The Proof-of-Work Concept (Daniel Krawisz) – https://nakamotoinstitute.org/mempool/the-proof-of-work-concept/
2013 – Real Crypto-Anarchy Without Anonymity (Oleg Andreev) – https://blog.oleganza.com/post/71410377996/real-crypto-anarchy-without-anonymity
2013 – The Log: What every software engineer should know about real-time data’s unifying abstraction (Jay Kreps) – https://engineering.linkedin.com/distributed-systems/log-what-every-software-engineer-should-know-about-real-time-datas-unifying
2014 – Analysis of Hashrate-Based Double Spending (Meni Rosenfeld) – https://arxiv.org/abs/1402.2009
2014 – Proof That Proof-of-Work is the Only Solution to the Byzantine Generals’ Problem (Oleg Andreev) – https://gist.github.com/oleganza/8cc921e48f396515c6d6A Graduate Course in Applied Cryptography – https://toc.cryptobook.us/
Thanks for reading!