Crypto means cryptography

Evervault Papers

The most important cryptography papers spanning the past, present, and future of cryptosystems & cryptology.

On the (Im)possibility of Obfuscating Programs
Read more
On the (Im)possibility of Obfuscating Programs

Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, & Ke Yang

Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups
Read more
Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups

David L. Chaum

A Digital Signature Based on a Conventional Encryption Function
Read more
A Digital Signature Based on a Conventional Encryption Function

Ralph C. Merkle

The Knowledge Complexity of Interactive Proof-Systems
Read more
The Knowledge Complexity of Interactive Proof-Systems

Shafi Goldwasser, Silvio Micali, & Charles Rackoffero

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security
Read more
Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security

Matt Blaze, Whit eld Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, & Michael Wiener

CryptDB: Protecting Confidentiality with Encrypted Query Processing
Read more
CryptDB: Protecting Confidentiality with Encrypted Query Processing

Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, & Hari Balakrishnan

Protocols for Secure Computations
Read more
Protocols for Secure Computations

Andrew C. Yao

Bitcoin: A Peer-to-Peer Electronic Cash System
Read more
Bitcoin: A Peer-to-Peer Electronic Cash System

Satoshi Nakamoto

A fully homomorphic encryption scheme
Read more
A fully homomorphic encryption scheme

Craig Gentry

On Data Banks and Privacy Homomorphisms
Read more
On Data Banks and Privacy Homomorphisms

Ronald L. Rivest, Len Adleman, & Michael L. Dertouzos

A fast quantum mechanical algorithm for database search
Read more
A fast quantum mechanical algorithm for database search

Lov K. Grover

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
Read more
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

Peter Shor

Use of Elliptic Curves in Cryptography
Read more
Use of Elliptic Curves in Cryptography

Victor Miller

Elliptic Curve Cryptosystems
Read more
Elliptic Curve Cryptosystems

Neal Koblitz

A Method for Obtaining Digital Signatures and Public Key Cryptosystems
Read more
A Method for Obtaining Digital Signatures and Public Key Cryptosystems

Ronald L. Rivest, Adi Shamir, & Len Adleman

A Method for Obtaining Digital Signatures and Public Key Cryptosystems

A Method for Obtaining Digital Signatures and Public Key Cryptosystems

Ronald L. Rivest, Adi Shamir, & Len Adleman — Published September 1977

In New Directions in Cryptography, Diffie & Hellman proposed a theoretical construction of public-key cryptography (PKC).

In A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Rivest, Shamir, and Adleman provided the first practical implementation of PKC — and introduced us to Alice and Bob.

Diffie would later call the RSA system the single most spectacular contribution to public-key cryptography.

Download PDF
New Directions in Cryptography
Read more
New Directions in Cryptography

Whitfield Diffie & Martin E. Hellman

Cramming more components onto integrated circuits
Read more
Cramming more components onto integrated circuits

Gordon Moore

A Mathematical Theory of Cryptography
Read more
A Mathematical Theory of Cryptography

Claude E. Shannon

La Cryptographie Militaire
Read more
La Cryptographie Militaire

Auguste Kerckhoffs

We’ll be adding new papers each week — don’t forget to subscribe below.

Get a crypto paper each week

Subscribe to Evervault Papers

You can unsubscribe at any time