Many of these I collated via nakamotoinstitute.org.
- List of Important Publications in Cryptography on Wikipedia
- Jul 1948 The Bell System Technical Journal - A Mathematical Theory of Communication By Claude Shannon
- Oct 1949 The Bell System Technical Journal - Communication Theory of Secrecy Systems by Claude Shannon
- 1957 Internet Archive - An Introduction to Probability Theory and Its Applications, Vol. I.pdf) by William Feller
- Nov 1976 IEEE Transactions on Information Theory, VOL. IT-22, NO. 6 - New Directions in Cryptography by Whitfield Diffie and Martin Hellman - this paper describes Diffie-Hellman key exchange
- Feb 1978 people.csail.mit.edu/rivest/ - A Method for Obtaining Digital Signatures and Public-key Cryptosystems by Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman
- Apr 1978 merkle.com - Protocols for Public Key Cryptosystems by Ralph C. Merkle
- Apr 1978 merkle.com - Secure Communications over Insecure Channels by Ralph C. Merkle
- 04-Jun-1979 merkle.com - Secrecy, Authentication, And Public Key Systems by Ralph C. Merkle - this is his PhD thesis, where he proposed the cryptographic hash function
- 1981 Research Paper - Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms by David Chaum
- 1982 Research Paper - Blind Signatures for Untraceable Payments by David Chaum
- Jul 1982 lamport.azurewebsites.net/pubs - The Byzantine Generals Problem by Leslie Lamport, Robert Shostak, and Marshall Pease
- Aug 1984 Communication of the ACM, Vol. 27, No. 8 - Reflections on Trusting Trust by Ken Thompson (co-creator of Unix)
- 1988 Research Paper - The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability by David Chaum
- 1998-2000 iang.org - Financial Cryptography in 7 Layers by Ian Grigg
- 1989 Research Paper - Online Cash Checks by David Chaum
- Dec 1990 NakamotoInstitute.org - Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial by Fred B. Schneider
- 1991 anf.es - How to Time-Stamp a Digital Document by Stuart Haber and W. Scott Stornetta
- Jul 1991 people.csail.mit.edu/silvio/ - Proofs that Yield Nothing But Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems by Oded Goldreich, Silvio Micali, and Avi Wigderson
- 1992 Scientific American - Achieving Electronic Privacy by David Chaum
- Mar 1999 math.columbia.edu - Improving the Efficiency and Reliability of Digital Time-Stamping by Stuart Haber, W. Scott Stornetta, and Dave Bayer
- 22-Nov-1992 Cypherpunk Mailing List - Crypto Glossary by Eric Hughes and Timothy C. May
- 1993 szabo.best.vwh.net (Web Archive) - Multinational Small Business by Nick Szabo
- 19-Aug-1993 Cypherpunk Mailing List (I think) - Digital Cash & Privacy by Hal Finney
- 15-Oct-1993 (Rev. 13-Mar-1996) www.finney.org/~hal/ (Web Archive) - Detecting Double Spending by Hal Finney
- 30-Mar-1994 Cypherpunk Mailing List (I think) - PGP Web of Trust Misconceptions by Hal Finney
- 1996 szabo.best.vwh.net (Web Archive) - Negative Reputation by Nick Szabo
- 1997 szabo.best.vwh.net (Web Archive) - Formalizing and Securing Relationships on Public Networks by Nick Szabo
- Apr 1997 NakamotoInstitute.org - Secure Names for Bit-Strings by Stuart Haber and W. Scott Stornetta
- 1998/1999 szabo.best.vwh.net (Web Archive) - Secure Property Titles with Owner Authority by Nick Szabo
- Apr 1998-Dec 1999 NakamotoInstitute.org - The Geodesic Market by Robert Hettinga - pdf link
- May 1999 szabo.best.vwh.net (Web Archive) - Micropayments and Mental Transaction Costs by Nick Szabo
- 1999 szabo.best.vwh.net (Web Archive) - Intrapolynomial Cryptography by Nick Szabo
- 1999 szabo.best.vwh.net (Web Archive) - Contracts with Bearer by Nick Szabo
- 1999 www.theiia.org (Web Archive) - The God Protocols by Nick Szabo
- May 1999 Proceedings of IEEE - Design of a Secure Timestamping Service with Minimal Trust Requirements by Henri Massias, Xavier Serret-Avila, and Jean-Jacques Quisquater
- 2000 erights.org - Capability-based Financial Instruments by Mark S. Miller, Chip Morningstar, and Bill Frantz - HTML version
- 2002 szabo.best.vwh.net (Web Archive) - Trusted Third Parties are Security Holes by Nick Szabo
- 2002 szabo.best.vwh.net (Web Archive) - A Formal Language for Analyzing Contracts by Nick Szabo
- 2002 szabo.best.vwh.net (Web Archive) - Shelling Out: The Origins of Money by Nick Szabo
- 2002 szabo.best.vwh.net (Web Archive) - The Playdough Protocols by Nick Szabo
- 2002 szabo.best.vwh.net (Web Archive) - Measuring Value by Nick Szabo
- 2002 pages.upf.pf/Alban.Gabillon/ - Improving Time Stamping Schemes: A Distributed Point of View by Alexis Bonnecaze, Pierre Liardet, Alban Gabillon, and Kaouther Blibech
- 2002 microsoft.com/en-us/research/ - The Sybil Attack by John R. Douceur
- 01-Aug-2002 - Hashcash - Denial of Service Counter-Measure by Adam Back
- 2003 szabo.best.vwh.net (Web Archive) - Advances in Distributed Security by Nick Szabo
- 2004 szabo.best.vwh.net (Web Archive) - Scarce Objects by Nick Szabo
- 06-Jul-2004 iang.org - The Ricardian Contract by Ian Grigg
- 18-May-2004 svn.torproject.org - Tor: The Second-Generation Onion Router by Roger Dingledine, Nick Mathewson, Paul Syverson
- 15-Aug-2004 Cypherpunk Mailing List - RPOW - Reusable Proofs of Work by Hal Finney - link to archive of RPOW website, link to archive of RPOW codebase
- 2005 epointsystem.org/~nagydani/ - On Digital Cash-Like Payment Systems by Daniel A. Nagy
- Dec 2005 Unenumerated (Nick Szabo’s Blog) - Bit gold
- 25-Dec-2005 iang.org - Triple Entry Accounting by Ian Grigg
- 2008 NakamotoInstitute.org - Truledger in Plain English by Bill St. Clair - link to original
- 30-Oct-2008 NakamotoInstitute.org - Lucre: Anonymous Electronic Tokens v1.8 by Ben Laurie
- 31-Oct-2008 Cryptography Mailing List - The Bitcoin Whitepaper by Satoshi Nakamoto - link to original announcement
- 24-Jul-2014 IPFS.io - IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) by Juan Benet
- Dec 2014 O’Reilly Books - Mastering Bitcoin (free to read on GitHub) by Andreas Antonopoulos
- 05-Sep-2015 Garret Fogerlie - How Tor Users Got Caught - Defcon 22
- 07-Dec-2015 bitcoin-dev Mailing List - Capacity increases for the Bitcoin system - (Core’s Roadmap)
- 87-Apr-2016 Università di Trento - Distributed Algorithms for Peer-to-Peer Systems
- 28-Oct-2016 Bitcoincore.org - Segregated Witness Costs and Risks
- 13-Apr-2017 The Merkle - What is a BIP
- 10-Jul-2017 HackerNoon.com - Ethereum: Turing-Completeness and Rich Statefulness Explained by Kyle Wang
- 14-Aug-2017 Filecoin.io - Filecoin: A Decentralized Storage Network by Protocol Labs
Return to Home
Please note that the information presented on this site was composed from publicly available materials in mainly 2017 and 2018 and has not been significantly updated since.
The information presented here may be significantly out of date or even inaccurate. In the case of inaccuracy, please file an Issue in the GitHub repo. The site should not be used as a source of truth.