Category
3 views
Category
Alphabetical
Date
Category | Full Reference | * |
---|---|---|
Web Resources | Antsstyle. “Web3: A terrible idea that is ignorant of history and technology”. Medium. Jan 03, 2022. Accessed between October 2022 and February 2023. https://medium.com/@antsstyle/web3-a-terrible-idea-that-is-ignorant-of-history-and-technology-92398ee66c3f | * |
Web Resources | Bitcoin Wiki Contributors. “B-Money”. Bitcoin Wiki. Jan 29, 2016. Accessed Jan 09, 2019. https://en.bitcoin.it/w/index.php?title=B-money&oldid=60249 | * |
Web Resources | Bitcoin Wiki Contributors. “B-money”. Jun 29, 2022. Accessed between October 2022 and February 2023. https://en.bitcoin.it/w/index.php?title=B-money&oldid=69350 | * |
Web Resources | Buterin, Vitalik. “Bitcoin is not quantum-safe, and how we can fix it when needed”. Bitcoin Magazine. Jul 30, 2013. Accessed before May 2020. https://bitcoinmagazine.com/technical/bitcoin-is-not-quantum-safe-and-how-we-can-fix-1375242150 | * |
Web Resources | Buterin, Vitalik. “Privacy on the Blockchain”. Ethereum Foundation Blog. Jan 15, 2016. Accessed before May 2020. https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain | * |
Web Resources | GitHub. “Bitcoin Core”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin/bitcoin | * |
Web Resources | GitHub. “Bitcoin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/bitcoin | * |
Web Resources | GitHub. “Introduction to Mimblewimble and Grin”. Creation date unknown. Accessed between October 2022 and February 2023. https://github.com/mimblewimble/grin/blob/master/doc/intro.md | * |
Web Resources | Heilman, Ethan; Narula, Neha; Dryja, Thaddeus; Virza, Madars. “IOTA Vulnerability Report: Cryptanalysis of the Curl Hash Function Enabling Practical Signature Forgery Attacks on the IOTA Cryptocurrency”. Github. Sep 07, 2017. Accessed before May 2020. https://github.com/mit-dci/tangled-curl/blob/master/vuln-iota.md | * |
Web Resources | Hughes, Eric. “A Cypherpunk’s Manifesto”. Activism. Mar 09, 1993. Accessed before May 2020. https://www.activism.net/cypherpunk/manifesto.html | * |
Web Resources | Ito, Joi. “Our response to ‘A Cryptocurrency Without a Blockchain Has Been Built to Outperform Bitcoin”. Mit Media Lab. Dec 20, 2017. Accessed before May 2020. https://www.media.mit.edu/posts/iota-response/ | * |
Web Resources | Keller, Chris. “Merkle Trees in Ethereum - A Basic Overview”. Medium. Feb 25, 2019. Accessed between October 2022 and February 2023. https://medium.com/@ckeller615/merkle-trees-in-ethereum-a-basic-overview-e56542c8c2b8 | * |
Web Resources | Narula, Neha. “Cryptographic vulnerabilities in IOTA”. Medium. Sep 07, 2017. Accessed before May 2020. https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367 | * |
Web Resources | Nomana, Majeed. “Ethereum Scaling Keys: zk-Rollups and Optimistic Rollups”. Blockchain Academy Mittweida. Oct 20, 2021. Accessed between October 2022 and February 2023. https://blockchain-academy.hs-mittweida.de/2021/10/ethereum-scaling-keys-zk-rollups-and-optimistic-rollups/ | * |
Web Resources | Petracek, Nelson. “What zero-knowledge proofs will do for blockchain”. VentureBeat. Dec 16, 2017. Accessed before May 2020. https://venturebeat.com/security/what-zero-knowledge-proofs-will-do-for-blockchain/ | * |
Web Resources | Prasanna. “Litecoin To Implement Mimblewimble”. Cryptoticker. Feb 08, 2019. Accessed before May 2020. https://cryptoticker.io/en/litecoin-implement-mimblewimble/ | * |
Web Resources | Schor, Lukas. “On Zero-Knowledge Proofs in Blockchains”. Medium. Mar 23, 2018. Accessed before May 2020. https://schor.medium.com/on-zero-knowledge-proofs-in-blockchains-14c48cfd1dd1 | * |
Web Resources | Szabo, Nick. “Bit gold”. Unenumerated. Dec 27, 2008. Accessed before May 2020. http://unenumerated.blogspot.com/2005/12/bit-gold.html | * |
Web Resources | Wetzel, Tyler. “Understanding the Jargon of the Blockchain and Cryptocurrency World”. Medium. Aug 23, 2018. Accessed before May 2020. https://medium.com/@twwetzel76/understanding-the-jargon-of-the-blockchain-and-cryptocurrency-world-64b5f431bcd5 | * |
Web Resources | Wikipedia Contributors. “Cryptographic hash function” May 31, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptographic_hash_function&oldid=783169743 | * |
Web Resources | Wikipedia Contributors. “Cryptography”. Wikipedia. Apr 22, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Cryptography&oldid=776651451 | * |
Web Resources | Wikipedia Contributors. “Digital signature”. Wikipedia. May 26, 2017. Accessed Jun 10, 2017. https://en.wikipedia.org/w/index.php?title=Digital_signature&oldid=782296267 | * |
Web Resources | Wikipedia Contributors. “Peer-to-peer”. Wikipedia. Jan 05, 2019. Accessed Jan 09, 2019. https://en.wikipedia.org/w/index.php?title=Peer-to-peer&oldid=876963442 | * |
Web Resources | Wikipedia Contributors. “Post-quantum cryptography”. Wikipedia. Aug 08, 2021. Accessed between October 2022 and February 2023. https://en.wikipedia.org/w/index.php?title=Post-quantum_cryptography&oldid=1037665575 | * |
Web Resources | Wikipedia Contributors. “Public key infrastructure”. WIkipedia. Feb 25, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Public_key_infrastructure&oldid=1141617159 | * |
Web Resources | Wikipedia Contributors. “Quantum computing”. Wikipedia. Mar 20, 2023. Accessed March 2023. https://en.wikipedia.org/w/index.php?title=Quantum_computing&oldid=1145600783 | * |
Web Resources | Wouter, Castryck. “Elliptic curves are quantum dead, long live elliptic curves”. COSIC Cryptography Blog. May 31, 2017. Accessed before May 2020. https://www.esat.kuleuven.be/cosic/blog/elliptic-curves-are-quantum-dead-long-live-elliptic-curves/ | * |
Web Resources | Young, Joseph. “Anonymous cryptocurrencies: why Edward Snowden supports the concept of evidence with zero disclosure”. Sudonull. Feb 02, 2018. Accessed before May 2020. https://sudonull.com/post/62714-Anonymous-cryptocurrencies-why-Edward-Snowden-supports-the-concept-of-evidence-with-zero-disclosure- | * |
Books | Adams, Carlisle; Lloyd, Steve. Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, 2001. pp. 11-15. | * |
Books | Antonopoulos, Andreas M. Mastering Bitcoin: Programming the Open Blockchain. O’Reilly, 2017 | * |
Books | Becket, B. Introduction to Cryptology. Blackwell Scientific Publications, 1988 | * |
Books | Bellare, Mihir; Rogaway, Phillip. Introduction to Modern Cryptography. University of California: Davis, 2005. https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf | * |
Books | Bertsekas, Dimitri P.; Gallager, Robert G. Data Networks. Prentice Hall, 1992 | * |
Books | Boyle, David. The Little Money Book. Alastair Sawday Publishing, 2003 | * |
Books | Coulouris, George; Dollimore, Jean; Kindberg, Tim; Blair, Gordon. Distributed Systems: Concepts and Design. 5th ed. Addison-Wesley, 2011 | * |
Books | Esslinger, Berhnhard. The CrypTool Script: Cryptography, Mathematics, and More. 10th ed. Distributed with CrypTool version 1.4.30, 2010. https://web.archive.org/web/20110722183013/http://www.cryptool.org/download/CrypToolScript-en.pdf | * |
Books | Flannery, Sarah; Flannery, David. In Code: A Mathematical Journey. Workman Publishing Company, 2001 | * |
Books | Goldreich, Oded. Foundations of Cryptography. Cambridge: Cambridge University Press, 2001. http://www.myilibrary.com?id=43006 | * |
Books | Hurwicz, Leonid; Reiter, Stanley. Designing Economic Mechanisms. Cambridge University Press, 2010. https://doi.org/10.1017/CBO9780511754258 | * |
Books | Katz, Jonathan; Lindell, Yehuda. Introductions to Modern Cryptography. CRC Press, Cryptography and Network Security Series, 2nd Edition, 2014 | * |
Books | Schär, Fabian; Berentsen, Aleksander. Bitcoin, Blockchain und Kryptoassets: Eine umfassende Einführung. Books on Demand, 2017 | * |
Books | Stallings, William. Cryptography and Network Security: Principles and Practice. Prentice Hall, 6th Edition, 2013 | * |
Papers | Alonso, Kurt M. “Zero to Monero: First Edition - A Technical Guide To A Private Digital Currency; For Beginners, Amateurs, And Experts”. Getmonero (2018): https://www.getmonero.org/library/Zero-to-Monero-1-0-0.pdf | * |
Papers | Andersen, David; Balakrishnan, Hari; Kaashoek, Frans; Morris, Robert. “Resilient Overlay Networks”. MIT Laboratory for Computer Science (2001): http://nms.lcs.mit.edu/papers/ron-sosp2001.pdf | * |
Papers | Bayer, Dave; Haber, Stuart; Stornetta, Wakefield S. “Improving the Efficiency And Reliability of Digital Time-Stamping”. Methods in Communication, Security and Computer Science (March 1992): pp. 329-334. | * |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Garman, Christina; Green, Matthew; Miers, Ian; Tromer, Eran; Virza, Madars. “Zerocash: Decentralized Anonymous Payments from Bitcoin”. (May 2014): http://zerocash-project.org/media/pdf/zerocash-extended-20140518.pdf | * |
Papers | Ben-Sasson, Eli; Chiesa, Alessandro; Tromer, Eran; Virza, Madars. “Succint Non-Interactive Zero Knowledge for a von Neumann Architecture”. (February 2019): https://eprint.iacr.org/2013/879.pdf | * |
Papers | Chaum, David. “Blind Signatures for Untraceable Payments”. Advances in Cryptology, Boston, MA: Springer US (1983): pp. 199-203. https://link.springer.com/chapter/10.1007/978-1-4757-0602-4_18 | * |
Papers | Chaum, David; Fiat, Amos; Naor, Moni.“Untraceable electronic cash”. For the 88th Proceedings of Advances in Cryptology. New York: Springer (February 1990): pp. 319-327 | * |
Papers | Diffie, Whitfield; Hellman, Martin E. “New Directions in Cryptography”. IEEE Transactions on Information Theory Volume IT-22, Issue 6 (November 1976): https://ee.stanford.edu/~hellman/publications/24.pdf | * |
Papers | Haber, Stuart; Stornetta, Wakefield S. “How to time-stamp a digital document”. Journal of Cryptology Volume 3, Issue 2 (January 1991): pp. 99-111. https://doi.org/10.1007/BF00196791 | * |
Papers | Lazarov, Ivan; Botha, Quentin; Costa, Nathalia O.; Hackel, Jakob.“Reporting of Cross-Border Transactions for Tax Purposes via DLT”. Communications in Computer and Information Sciences Volume 1633 (August 2022): pp. 282-293. 10.1007/978-3-031-14343-4_26 | * |
Papers | Mansfield-Devine, Steve. “Darknets”. Computer Fraud & Security Volume 2009, Issue 12 (December 2009): pp. 4-6. https://doi.org/10.1016/S1361-3723(09)70150-2 | * |
Papers | Maymounkov, Petar; Mazières, David. “Kademlia: A Peer-to-peer Information System Based on the XOR Metric”. In Peer-to-Peer Systems. IPTPS 2002. Lecture Notes in Computer Science Volume 2429 (October 2002): pp. 53-65. https://doi.org/10.1007/3-540-45748-8_5 | * |
Papers | McFadden, Daniel. “The human side of mechanism design: a tribute to Leo Hurwicz and Jean-Jacque Laffont”. Review of Economic Design Volume 13, Issue 1-2 (April 2009): pp. 77-100. | * |
Papers | Merkle, Ralph C. “Method of providing digital signatures”. US Patent 4309569, 1982. https://patentimages.storage.googleapis.com/69/ab/d9/2ff9f94fada6ea/US4309569.pdf | * |
Papers | Merkle, Ralph C. “Secrecy, authentication, and public key systems”. Ph.D. thesis, Stanford University, 1979. http://www.merkle.com/papers/Thesis1979.pdf | * |
Papers | Merkle, Ralph C. “Secure Communications Over Insecure Channels”. Communications of the ACM Volume 21, Issue 4 (1978). | * |
Papers | Metcalfe, Robert M.; Boggs, David R. “Ethernet: Distributed Packet Switching for Local Computer Networks”. Communications of the ACM Volume 19, Issue 5 (July 1976): pp. 395-404. https://web.archive.org/web/20070807213308/http://www.acm.org/classics/apr96/ | * |
Papers | Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System”. (October 2008): https://bitcoin.org/bitcoin.pdf | * |
Papers | Nisan, Noam; Ronen, Amir. “Algorithmic Mechanism Design”. Proceedings of the 31st ACM Symposium on Theory of Computing (April 2001): pp. 129-140 | * |
Papers | Rivest, Ronald L.; Shamir, Adi; Adleman, Leonard M. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM Volume 21, Issue 2 (February 1978): http://people.csail.mit.edu/rivest/Rsapaper.pdf | * |
Papers | Saroiu, Stefan; Gummadi, Krishna P.; Gribble, Steven D. “A Measurement Study of Peer-to-Peer File Sharing Systems”. Technical Report UW-CSE-01-06-02, University of Washington, Department of Computer Science and Engineering (July 2001) | * |
Papers | Simmonds, Andrew; Sandilands, Peter; van Ekert, Louis. “An Ontology for Network Security Attacks”. In Applied Computing. Lecture Notes in Computer Science, Heidelberg: Springer (2004): pp. 317-323. 10.1007/978-3-540-30176-9_41 | * |
Papers | Stevens, Hallam. “Hans Peter Luhn and the birth of the hashing algorithm”. IEEE Spectrum Volume 55, Issue 2 (February 2018): pp. 44-49. 10.1109/MSPEC.2018.8278136 | * |
Papers | Stolbikova, Veronika. “Can Elliptic Curve Cryptograph be Trusted? A Brief Analysis of the Security of a Popular Cryptosystem”. ISACA Journal Volume 3 (May 2016). https://www.isaca.org/resources/isaca-journal/issues/2016/volume-3/can-elliptic-curve-cryptography-be-trusted-a-brief-analysis-of-the-security-of-a-popular-cryptosyste#:~:text=Conclusion,a whole%2C remains fairly secure | * |
Papers | Wood, Jessica. “The Darknet: A Digital Copyright Revolution”. Richmond Journal of Law and Technology Volume 16, Issue 4 (2010). http://jolt.richmond.edu/v16i4/article14.pdf | * |
Project | Bitcoin Core: https://bitcoin.org/de/download | * |
Project | Electrum: https://electrum.org/ | * |
Project | IPFS: https://ipfs.tech/ | * |
Project | Ledger: https://www.ledger.com/ | * |
Project | Monero: https://getmonero.org/ | * |
Project | SIA: https://sia.tech/ | * |
Project | Storj: https://www.storj.io/ | * |
Project | Swarm: https://swarmnetwork.org/ | * |
Project | Trezor: https://trezor.io/ | * |
Project | Zcash: https://z.cash/ | * |
© 2022 by KAMIKAT.SE inspired by T💛M - Painted Iconography by Drew Simpson (THE DREY)