# Recommended papers
###### tags: `bibliography` `reading sessions`
[toc]
## Introduction
> “There are only three kinds of papers worth writing: the first, the best, or the last.” Roger Needham:
* The First – introducing a new idea or opening a new research area.
* The Last – giving the last improvement on a method
* The Best – presenting a solution that is fielded in the real world
This page is a collection of papers that are worth reading based on the above.
---
(List papers in chronologic order)
## 1976
### Diffie, Whit, and Martin E. Hellman. "New Directions in Cryptography." IEEE Trans on Information Theory, 1976.
* https://stacks.stanford.edu/file/druid:nv877pw2898/24%20NewDir.pdf
* Notes: First paper on public-key cryptography; Diffie-Hellman key exchange widely deployed in practice.
## 1985
### Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Trans on Information Theory, 1985
* https://ieeexplore.ieee.org/document/1057074
* Notes: ElGamal encryption is used in many security applications.
### Shafi Goldwasser, Silvio M. Micali, and Charles Rackoff. The Knowledge Complexity of Interactive Proof Systems, ACM STOC, 1985
* https://dl.acm.org/doi/10.1145/22145.22178
* Notes: The first paper on Zero Knowledge Proofs (ZKPs); opened a new field of research and ZKPs are widely used in cryptographic applications.
## 1986
### Fiat, Amos, and Adi Shamir. "How to prove yourself: Practical solutions to identification and signature problems." CRYPTO'86.
* [link to paper](https://mit6875.github.io/PAPERS/Fiat-Shamir.pdf)
* Notes: Fiat-Shamir heuristics are a standard method to transform an interactive ZKP to a non-interactive one. Widely used in practice.
## 1992
### Bellovin, Steven M., and Michael Merritt. "Encrypted key exchange: Password-based protocols secure against dictionary attacks." S&P. 1992.
* [Link to paper](https://www.cs.columbia.edu/~smb/papers/neke.pdf)
* Notes: first paper on password-authenticated key exchange (PAKE); opened a new field.
## 1999
### Juels, Ari; Brainard, John. "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks". NDSS, 1999.
* [Link to paper](https://www.ndss-symposium.org/ndss1999/cryptographic-defense-against-connection-depletion-attacks/)
* Notes: deployed in some practical applications e.g., [anubis](https://anubis.techaro.lol/docs/design/how-anubis-works)
## 2002
### Kiayias, Aggelos, and Moti Yung. "Self-tallying elections and perfect ballot secrecy." PKC, 2002.
* [Link to paper](https://link.springer.com/chapter/10.1007/3-540-45664-3_10)
* Notes: first paper on decentralized e-voting with self-tallying; was a niche topic in 2002, but has become a main stream topic 20 years later in DAO voting (which is decentralized by nature)
## 2003
### Daugman, John. "The importance of being random: statistical principles of iris recognition." Pattern recognition, 2003
* [Link to paper](https://www.cl.cam.ac.uk/~jgd1000/patrec.pdf)
* Notes: The Daugman's method forms the basis of all public deployments of iris recognitions worldwide
## 2004
### Chaum, David. Secret-ballot Receipts: True Voter-verifiable Elections, IEEE S&P, 2004
* https://ieeexplore.ieee.org/abstract/document/1264852
* Notes: First design for E2E verifiable e-voting; pushed forward research on E2E verifiable e-voting systems.
## 2008
### Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system.", 2008
* [Link to paper](https://assets.pubpub.org/d8wct41f/31611263538139.pdf)
* Notes: First paper on BitCoin; opened a new research field and an entirely new cryptocurrency industry
## 2009
### Adida, Ben, et al. "Electing a university president using open-audit voting: Analysis of real-world use of Helios." EVT/WOTE, 2009
* [Link to paper](https://www.usenix.org/legacy/event/evtwote09/tech/full_papers/adida-helios.pdf)
* Notes: first use of E2E e-voting in a real-world election; the Helios voting system used in some applications, e.g., IACR.
## 2017
### Ashish Vaswani, et al. "Attention Is All You Need" NeurIPS, 2017
* [Link to paper](https://arxiv.org/abs/1706.03762)
* Notes: First paper mentioning Transformer in AI, which is a landmark paper in machine learning.
## 2018
### Bünz, Benedikt, et al. "Bulletproofs: Short proofs for confidential transactions and more." IEEE S&P, 2018.
* [Link to paper](https://eprint.iacr.org/2017/1066.pdf)
* Notes: BulletProof used in some applications, e.g., [Monero](https://www.getmonero.org/)