- Untraceable electronic mail, return addresses, and digital pseudonyms
- The Protection of Information in Computer Systems
- Understanding the Mirai Botnet
- Bitcoin Paper
- Blockchain Paper
- Hashcash
- Introduction To Blockchain
- https://medium.com/founder-playbook/67-blockchain-articles-whitepapers-that-shaped-crypto-into-what-it-is-today-c538facfceb9
- Blockchains from a Distributed Computing Perspective
- Blockstack: A Global Naming and Storage System Secured by Blockchains
- IPFS
- Bitcoin-NG: A Scalable Blockchain Protocol
- A Secure Sharding Protocol For Open Blockchain
- Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
- Service-Oriented Sharding for Blockchain
- The stellar consensus protocol: A federated model for internet-level consensus
- Ethereum White Paper
- Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab
- A Concurrent Perspective on Smart Contracts
- Zerocash: Decentralized Anonymous Payments from Bitcoin
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- Lightning Network
- SnailTrail: Generalizing Critical Paths for Online Analysis of Distributed Dataflows
- TUX2: Distributed Graph Computation for Machine Learning
- Litz: An Elastic Framework for High-Performance Distributed Machine Learning
- Scalable Asynchronous Gradient Descent Optimization for Out-of-Core Models
- Tor Design
- Tor Bridge Discovery
- A Model of Onion Routing with Provable Anonymity
- Locating Hidden Servers
- IPFS - Content Addressed, Versioned, P2P File System
- API Design
- Breach: Reviving The Crime Attack
- Cloak of Visibility
- Thinking about Availability in Large Service Infrastructures
- A Look Back at “Security Problems in the TCP/IP Protocol Suite”
- Filecoin: A Decentralized Storage Network
- Breaking the Browser Language Barrier
- Defending Internet Freedom through Decentralization Back to the Future?
- The anatomy of a large-scale hypertextual Web search engine
- The Tail at Scale
- Analysis of the Go runtime scheduler
- An Implementation and Analysis of a Kernel Network Stack in Go with the CSP Style
- Spanner: Google’s Globally Distributed Database
- A Call to Arms: Revisiting Database Design
- Architecture of a Database System
- ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications
- Back to the Future: Lisp as a Base for a Statistical Computing System
- How Professional Hackers Understand Protected Code while Performing Attack Tasks
- Papers We Love
- Communicating Sequential Processes
- Hints on programming language design
- The Fault Tolerance of Botnets
- Paradigm Shift in Software Development
- Interpreting the Data: Parallel Analysis with Sawzall