- See Also
- Gwern
-
Links
- “OpenSquare: Decentralized Repeated Modular Squaring Service”, Aravinda et al 2021
- “Verifiable Timed Signatures Made Practical”, Thyagarajan et al 2020
- “How to Build Time-Lock Encryption”, Liu et al 2018
- “Join Me on a Market for Anonymity”, Moser & Böhme 2016
- “Decentralized Trusted Timestamping Using the Crypto Currency Bitcoin”, Gipp et al 2015
- “Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles”, Skjegstad et al 2014
- “[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others”, Todd 2013
- “Witness Encryption and Its Applications”, Garg 2013
- “High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks”, Cheng 2012
- “Time-Lock Puzzles in the Random Oracle Model”, Mahmoody et al 2011
- “Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods”, Haq 2008
- “LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time”, Mao 2000
- “How to Time-Stamp a Digital Document”, Haber & Stornetta 1991
- “What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?”
- “Timed-Release Crypto”
- “Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle”
- “Time-Lock Puzzles from Randomized Encodings”
- “Time-Lapse Cryptography”
- “Other Advanced Crypto Applications: Timed-Release Crypto”
- “Description of the LCS35 Time Capsule Crypto-Puzzle”
- “Low-Cost SHA-1 Hash Function Architecture for RFID Tags”, O’Neill 2024
- “Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem”, Miller & Gao 2024
- “Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.”
- “Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe...”
- “‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf”
- Wikipedia
- Miscellaneous
- Bibliography
See Also
Gwern
“Time-Lock Encryption”, Gwern 2011
Links
“OpenSquare: Decentralized Repeated Modular Squaring Service”, Aravinda et al 2021
“Verifiable Timed Signatures Made Practical”, Thyagarajan et al 2020
“How to Build Time-Lock Encryption”, Liu et al 2018
“Join Me on a Market for Anonymity”, Moser & Böhme 2016
“Decentralized Trusted Timestamping Using the Crypto Currency Bitcoin”, Gipp et al 2015
Decentralized Trusted Timestamping using the Crypto Currency Bitcoin
“Kadupul: Livin’ on the Edge With Virtual Currencies and Time-Locked Puzzles”, Skjegstad et al 2014
Kadupul: Livin’ on the Edge with Virtual Currencies and Time-Locked Puzzles
“[Bitcoin-Development] REWARD Offered for Hash Collisions for SHA1, SHA256, RIPEMD160 and Others”, Todd 2013
[Bitcoin-development] REWARD offered for hash collisions for SHA1, SHA256, RIPEMD160 and others:
“Witness Encryption and Its Applications”, Garg 2013
“High-Frequency Self-Aligned Graphene Transistors With Transferred Gate Stacks”, Cheng 2012
High-frequency self-aligned graphene transistors with transferred gate stacks
“Time-Lock Puzzles in the Random Oracle Model”, Mahmoody et al 2011
“Using Timed-Release Cryptography to Mitigate Preservation Risk of Embargo Periods”, Haq 2008
Using timed-release cryptography to mitigate preservation risk of embargo periods:
“LNCS 1796—Time-Lock Puzzle With Examinable Evidence of Unlocking Time”, Mao 2000
LNCS 1796—Time-Lock Puzzle with Examinable Evidence of Unlocking Time:
“How to Time-Stamp a Digital Document”, Haber & Stornetta 1991
“What Is the Progress on the MIT LCS35 Time Capsule Crypto-Puzzle?”
What is the progress on the MIT LCS35 Time Capsule Crypto-Puzzle?
“Timed-Release Crypto”
“Merkle Puzzles Are Optimal—An 𝒪(n2)-Query Attack on Any Key Exchange from a Random Oracle”
Merkle puzzles are optimal—an 𝒪(n2)-query attack on any key exchange from a random oracle:
“Time-Lock Puzzles from Randomized Encodings”
“Time-Lapse Cryptography”
“Other Advanced Crypto Applications: Timed-Release Crypto”
“Description of the LCS35 Time Capsule Crypto-Puzzle”
“Low-Cost SHA-1 Hash Function Architecture for RFID Tags”, O’Neill 2024
“Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem”, Miller & Gao 2024
Creating A Subpoena-Proof Diary: A Technological Solution to A Legal Problem
“Perfecting the Art of Sensible Nonsense: A New Cryptographic Scheme Obfuscates Computer Programs by Transforming Them into Something Akin to a Jigsaw Puzzle in Which Random Elements Make Each Individual Piece Look Meaningless.”
“Reliable Time-Lock Crypto. Step One: Obtain a Deep-Space Probe...”
Reliable time-lock crypto. Step one: obtain a deep-space probe...:
“‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf”
‘Research on Timed-Release Encryption’, 40505-40237-1-PB.pdf
Wikipedia
Miscellaneous
-
https://bitslog.com/2015/02/17/faster-sha-256-asics-using-carry-reduced-adders/
-
https://blog.janestreet.com/really-low-latency-multipliers-and-cryptographic-puzzles/
: -
https://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.5709
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.7127&rep=rep1&type=pdf
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.2.3030&rep=rep1&type=ps
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.460.2104&rep=rep1&type=pdf#page=2
: -
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.597.6304&rep=rep1&type=pdf
-
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.78.6879&rep=rep1&type=pdf
-
https://crypto.stackexchange.com/questions/606/time-capsule-cryptography
-
https://en.bitcoin.it/wiki/Why_a_GPU_mines_faster_than_a_CPU
-
https://eprint.iacr.org/2017/201
:View External Link:
-
https://github.com/lahwran/mac-sleeplocker/blob/master/timelock.py
-
https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf
: -
https://www.cs.tufts.edu/comp/116/archive/fall2013/wclarkson.pdf
: -
https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle
: -
https://www.daemonology.net/blog/2011-06-03-insecurity-in-the-jungle.html
: -
https://www.halfbakery.com/idea/Do_20not_20decrypt_20until_20_2e_2e_2e
-
https://www.iacr.org/conferences/crypto2011/slides/01-3-Mahmoody.pdf
: -
https://www.microsoft.com/en-us/research/wp-content/uploads/2003/08/crypto03.pdf
: -
https://www.quantamagazine.org/computer-scientists-achieve-crown-jewel-of-cryptography-20201110/
: -
https://www.reddit.com/r/Bitcoin/comments/27adbq/timelock_timerelease_encryption_incentivised_by/
: -
https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/
: -
https://www.reddit.com/r/compsci/comments/1nx0n5/timelock_encryption/ccne7bk/
-
https://www.tarsnap.com/scrypt.html
:View HTML:
-
https://www.wired.com/2010/07/wikileaks-insurance-file/
:View External Link:
-
https://www.wired.com/story/a-programmer-solved-a-20-year-old-forgotten-crypto-puzzle/
: -
https://wwwcn.cs.uni-duesseldorf.de/publications/publications/library/Jerschow2010a.pdf
:
Bibliography
-
1991-haber.pdf
: “How to Time-Stamp a Digital Document”,