Category | Full Reference | * |
---|---|---|
Web Resources | Antsstyle. “Web3: A terrible idea that is ignorant of history and technology”. Medium. Jan 03, 2022. Accessed between October 2022 and February 2023. https://medium.com/@antsstyle/web3-a-terrible-idea-that-is-ignorant-of-history-and-technology-92398ee66c3f | |
Web Resources | Bitcoin Wiki Contributors. “B-Money”. Bitcoin Wiki. Jan 29, 2016. Accessed Jan 09, 2019. https://en.bitcoin.it/w/index.php?title=B-money&oldid=60249 | |
Web Resources | Bitcoin Wiki Contributors. “B-money”. Jun 29, 2022. Accessed between October 2022 and February 2023. https://en.bitcoin.it/w/index.php?title=B-money&oldid=69350 | |
Web Resources | Buterin, Vitalik. “Bitcoin is not quantum-safe, and how we can fix it when needed”. Bitcoin Magazine. Jul 30, 2013. Accessed before May 2020. https://bitcoinmagazine.com/technical/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150 | |
Web Resources | Buterin, Vitalik. “Privacy on the Blockchain”. Ethereum Foundation Blog. Jan 15, 2016. Accessed before May 2020. https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain | |
Web Resources | GitHub. “Bitcoin Core”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin/bitcoin | |
Web Resources | GitHub. “Bitcoin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin | |
Web Resources | GitHub. “Introduction to Mimblewimble and Grin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/mimblewimble/grin/blob/master/doc/intro.md | |
Web Resources | Heilman, Ethan; Narula, Neha; Dryja, Thaddeus; Virza, Madars. “IOTA Vulnerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency”. Github. Sep 07, 2017. Accessed before May 2020. https://github.com/mit-dci/tangled-curl/blob/master/vuln-iota.md | |
Web Resources | Hughes, Eric. “A Cypherpunk’s Manifesto”. Activism. Mar 09, 1993. Accessed before May 2020. https://www.activism.net/cypherpunk/manifesto.html | |
Web Resources | Ito, Joi. “Our response to ‘A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin”. Mit Media Lab. Dec 20, 2017. Accessed before May 2020. https://www.media.mit.edu/posts/iota-response/ | |
Web Resources | Keller, Chris. “Merkle Trees in Ethereum - A Basic Overview”. Medium. Feb 25, 2019. Accessed between October 2022 and February 2023. https://medium.com/@ckeller615/merkle-trees-in-ethereum-a-basic-overview-e56542c8c2b8 | |
Web Resources | Narula, Neha. “Cryptographic vulnerabilities in IOTA”. Medium. Sep 07, 2017. Accessed before May 2020. https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367 | |
Web Resources | Nomana, Majeed. “Ethereum Scaling Keys: zk-Rollups and Optimistic Rollups”. Blockchain Academy Mittweida. Oct 20, 2021. Accessed between October 2022 and February 2023. https://blockchain-academy.hs-mittweida.de/2021/10/ethereum-scaling-keys-zk-rollups-and-optimistic-rollups/ | |
Web Resources | Petracek, Nelson. “What zero-knowledge proofs will do for blockchain”. VentureBeat. Dec 16, 2017. Accessed before May 2020. https://venturebeat.com/security/what-zero-knowledge-proofs-will-do-for-blockchain/ | |
Web Resources | Prasanna. “Litecoin To Implement Mimblewimble”. Cryptoticker. Feb 08, 2019. Accessed before May 2020. https://cryptoticker.io/en/litecoin-implement-mimblewimble/ | |
Web Resources | Schor, Lukas. “On Zero-Knowledge Proofs in Blockchains”. Medium. Mar 23, 2018. Accessed before May 2020. https://schor.medium.com/on-zero-knowledge-proofs-in-blockchains-14c48cfd1dd1 | |
Web Resources | Szabo, Nick. “Bit gold”. Unenumerated. Dec 27, 2008. Accessed before May 2020. http://unenumerated.blogspot.com/2005/12/bit-gold.html | |
Web Resources | Wetzel, Tyler. “Understanding the Jargon of the Blockchain and Cryptocurrency World”. Medium. Aug 23, 2018. Accessed before May 2020. https://medium.com/@twwetzel76/understanding-the-jargon-of-the-blockchain-and-cryptocurrency-world-64b5f431bcd5 | |
Web Resources | Wikipedia Contributors. “Cryptographic hash function” May 31, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=783169743 | |
Web Resources | Wikipedia Contributors. “Cryptography”. Wikipedia. Apr 22, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptography&oldid=776651451 | |
Web Resources | Wikipedia Contributors. “Digital signature”. Wikipedia. May 26, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Digital_signature&oldid=782296267 | |
Web Resources | Wikipedia Contributors. “Peer-to-peer”. Wikipedia. Jan 05, 2019. Accessed Jan 09, 2019. https://en.wikipedia.org/w/index.php?title=Peer-to-peer&oldid=876963442 | |
Web Resources | Wikipedia Contributors. “Post-quantum cryptography”. Wikipedia. Aug 08, 2021. Accessed between October 2022 and February 2023. https://en.wikipedia.org/w/index.php?title=Post-quantum_cryptography&oldid=1037665575 | |
Web Resources | Wikipedia Contributors. “Public key infrastructure”. WIkipedia. Feb 25, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Public_key_infrastructure&oldid=1141617159 | |
Web Resources | Wikipedia Contributors. “Quantum computing”. Wikipedia. Mar 20, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Quantum_computing&oldid=1145600783 | |
Web Resources | Wouter, Castryck. “Elliptic curves are quantum dead, long live elliptic curves”. COSIC Cryptography Blog. May 31, 2017. Accessed before May 2020. https://www.esat.kuleuven.be/cosic/blog/elliptic-curves-are-quantum-dead-long-live-elliptic-curves/ | |
Web Resources | Young, Joseph. “Anonymous cryptocurrencies: why Edward Snowden supports the concept of evidence with zero disclosure”. Sudonull. Feb 02, 2018. Accessed before May 2020. https://sudonull.com/post/62714-Anonymous-cryptocurrencies-why-Edward-Snowden-supports-the-concept-of-evidence-with-zero-disclosure- | |
Books | Adams, Carlisle; Lloyd, Steve. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, 2001. pp. 11-15. | |
Books | Antonopoulos, Andreas M. Mastering Bitcoin: Programming the Open Blockchain. O’Reilly, 2017 | |
Books | Becket, B. Introduction to Cryptology. Blackwell Scientific Publications, 1988 | |
Books | Bellare, Mihir; Rogaway, Phillip. Introduction to Modern Cryptography. University of California: Davis, 2005. https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf | |
Books | Bertsekas, Dimitri P.; Gallager, Robert G. Data Networks. Prentice Hall, 1992 | |
Books | Boyle, David. The Little Money Book. Alastair Sawday Publishing, 2003 | |
Books | Coulouris, George; Dollimore, Jean; Kindberg, Tim; Blair, Gordon. Distributed Systems: Concepts and Design. 5th ed. Addison-Wesley, 2011 | |
Books | Esslinger, Berhnhard. The CrypTool Script: Cryptography, Mathematics, and More. 10th ed. Distributed with CrypTool version 1.4.30, 2010. https://web.archive.org/web/20110722183013/http://www.cryptool.org/download/CrypToolScript-en.pdf | |
Books | Flannery, Sarah; Flannery, David. In Code: A Mathematical Journey. Workman Publishing Company, 2001 | |
Books | Goldreich, Oded. Foundations of Cryptography. Cambridge: Cambridge University Press, 2001. http://www.myilibrary.com?id=43006 | |
Books | Hurwicz, Leonid; Reiter, Stanley. Designing Economic Mechanisms. Cambridge University Press, 2010. https://doi.org/10.1017/CBO9780511754258 | |
Books | Katz, Jonathan; Lindell, Yehuda. Introductions to Modern Cryptography. CRC Press, Cryptography and Network Security Series, 2nd Edition, 2014 | |
Books | Schär, Fabian; Berentsen, Aleksander. Bitcoin, Blockchain und Kryptoassets: Eine umfassende Einführung. Books on Demand, 2017 | |
Books | Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 6th Edition, 2013 | |
Papers | Alonso, Kurt M. “Zero to Monero: First Edition - A Technical Guide To A Private Digital Currency; For Beginners, Amateurs, And Experts”. Getmonero (2018): https://www.getmonero.org/library/Zero-to-Monero-1-0-0.pdf | |
Papers | Andersen, David; Balakrishnan, Hari; Kaashoek, Frans; Morris, Robert. “Resilient Overlay Networks”. MIT Laboratory for Computer Science (2001): http://nms.lcs.mit.edu/papers/ron-sosp2001.pdf | |
Papers | Bayer, Dave; Haber, Stuart; Stornetta, Wakefield S. “Improving the Efficiency And Reliability of Digital Time-Stamping”. Methods in Communication, Security and Computer Science (March 1992): pp. 329-334. | |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; Green, Matthew; Miers, Ian; Tromer, Eran; Virza, Madars. “Zerocash: Decentralized Anonymous Payments from Bitcoin”. (May 2014): http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf | |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Tromer, Eran; Virza, Madars. “Succint Non-Interactive Zero Knowledge for a von Neumann Architecture”. (February 2019): https://eprint.iacr.org/2013/879.pdf | |
Papers | Chaum, David; Fiat, Amos; Naor, Moni.“Untraceable electronic cash”. For the 88th Proceedings of Advances in Cryptology. New York: Springer (February 1990): pp. 319-327 | |
Papers | Chaum, David. “Blind Signatures for Untraceable Payments”. Advances in Cryptology, Boston, MA: Springer US (1983): pp. 199-203. https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18 | |
Papers | Diffie, Whitfield; Hellman, Martin E. “New Directions in Cryptography”. IEEE Transactions on Information Theory Volume IT-22, Issue 6 (November 1976): https://ee.stanford.edu/~hellman/publications/24.pdf | |
Papers | Haber, Stuart; Stornetta, Wakefield S. “How to time-stamp a digital document”. Journal of Cryptology Volume 3, Issue 2 (January 1991): pp. 99-111. https://doi.org/10.1007/BF00196791 | |
Papers | Lazarov, Ivan; Botha, Quentin; Costa, Nathalia O.; Hackel, Jakob.“Reporting of Cross-Border Transactions for Tax Purposes via DLT”. Communications in Computer and Information Sciences Volume 1633 (August 2022): pp. 282-293. 10.1007/978-3-031-14343-4_26 | |
Papers | Mansfield-Devine, Steve. “Darknets”. Computer Fraud & Security Volume 2009, Issue 12 (December 2009): pp. 4-6. https://doi.org/10.1016/S1361-3723(09)70150-2 | |
Papers | Maymounkov, Petar; Mazières, David. “Kademlia: A Peer-to-peer Information System Based on the XOR Metric”. In Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science Volume 2429 (October 2002): pp. 53-65. https://doi.org/10.1007/3-540-45748-8_5 | |
Papers | McFadden, Daniel. “The human side of mechanism design: a tribute to Leo Hurwicz and Jean-Jacque Laffont”. Review of Economic Design Volume 13, Issue 1-2 (April 2009): pp. 77-100. | |
Papers | Merkle, Ralph C. “Method of providing digital signatures”. US Patent 4309569, 1982. https://patentimages.storage.googleapis.com/69/ab/d9/2ff9f94fada6ea/US4309569.pdf | |
Papers | Merkle, Ralph C. “Secrecy, authentication, and public key systems”. Ph.D. thesis, Stanford University, 1979. http://www.merkle.com/papers/Thesis1979.pdf | |
Papers | Merkle, Ralph C. “Secure Communications Over Insecure Channels”. Communications of the ACM Volume 21, Issue 4 (1978). | |
Papers | Metcalfe, Robert M.; Boggs, David R. “Ethernet: Distributed Packet Switching for Local Computer Networks”. Communications of the ACM Volume 19, Issue 5 (July 1976): pp. 395-404. https://web.archive.org/web/20070807213308/http://www.acm.org/classics/apr96/ | |
Papers | Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System”. (October 2008): https://bitcoin.org/bitcoin.pdf | |
Papers | Nisan, Noam; Ronen, Amir. “Algorithmic Mechanism Design”. Proceedings of the 31st ACM Symposium on Theory of Computing (April 2001): pp. 129-140 | |
Papers | Rivest, Ronald L.; Shamir, Adi; Adleman, Leonard M. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM Volume 21, Issue 2 (February 1978): http://people.csail.mit.edu/rivest/Rsapaper.pdf | |
Papers | Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. “A Measurement Study of Peer-to-Peer File Sharing Systems”. Technical Report UW-CSE-01-06-02, University of Washington, Department of Computer Science and Engineering (July 2001) | |
Papers | Simmonds, Andrew; Sandilands, Peter; van Ekert, Louis. “An Ontology for Network Security Attacks”. In Applied Computing. Lecture Notes in Computer Science, Heidelberg: Springer (2004): pp. 317-323. 10.1007/978-3-540-30176-9_41 | |
Papers | Stevens, Hallam. “Hans Peter Luhn and the birth of the hashing algorithm”. IEEE Spectrum Volume 55, Issue 2 (February 2018): pp. 44-49. 10.1109/MSPEC.2018.8278136 | |
Papers | Stolbikova, Veronika. “Can Elliptic Curve Cryptograph be Trusted? A Brief Analysis of the Security of a Popular Cryptosystem”. ISACA Journal Volume 3 (May 2016). https://www.isaca.org/resources/isaca-journal/issues/2016/volume-3/can-elliptic-curve-cryptography-be-trusted-a-brief-analysis-of-the-security-of-a-popular-cryptosyste#:~:text=Conclusion,a whole%2C remains fairly secure | |
Papers | Wood, Jessica. “The Darknet: A Digital Copyright Revolution”. Richmond Journal of Law and Technology Volume 16, Issue 4 (2010). http://jolt.richmond.edu/v16i4/article14.pdf | |
Project | Bitcoin Core: https://bitcoin.org/de/download | |
Project | Electrum: https://electrum.org/ | |
Project | IPFS: https://ipfs.tech/ | |
Project | Ledger: https://www.ledger.com/ | |
Project | Monero: https://getmonero.org/ | |
Project | SIA: https://sia.tech/ | |
Project | Storj: https://www.storj.io/ | |
Project | Swarm: https://swarmnetwork.org/ | |
Project | Trezor: https://trezor.io/ | |
Project | Zcash: https://z.cash/ |
Token Economy (Third Edition)
Volume: Web3 Infrastructure
Chapter: Cryptography
Publication Date: 2023
This page lists all the sources used for the research of the chapters and provides a reading list for those who want to learn more about the topics in this chapter. The references are sorted by category, alphabetically, and by date when you select the drop down menu. In the date view, if the full date of a book or academic paper is not known, the last day of the publication year is used. The links on this page will be updated regularly to avoid broken links. Some links, especially those to the Internet Archives, may not be accessible in certain regions due to censorship. Thanks to Quentin Botha for the idea and the manual effort to categorize the references in this database format!