# Recommended papers ###### tags: `bibliography` `reading sessions` [toc] ## Introduction > “There are only three kinds of papers worth writing: the first, the best, or the last.” Roger Needham: * The First – introducing a new idea or opening a new research area. * The Last – giving the last improvement on a method * The Best – presenting a solution that is fielded in the real world This page is a collection of papers that are worth reading based on the above. --- (List papers in chronologic order) ## 1976 ### Diffie, Whit, and Martin E. Hellman. "New Directions in Cryptography." IEEE Trans on Information Theory, 1976. * https://stacks.stanford.edu/file/druid:nv877pw2898/24%20NewDir.pdf * Notes: First paper on public-key cryptography; Diffie-Hellman key exchange widely deployed in practice. ## 1985 ### Taher ElGamal. A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms, IEEE Trans on Information Theory, 1985 * https://ieeexplore.ieee.org/document/1057074 * Notes: ElGamal encryption is used in many security applications. ### Shafi Goldwasser, Silvio M. Micali, and Charles Rackoff. The Knowledge Complexity of Interactive Proof Systems, ACM STOC, 1985 * https://dl.acm.org/doi/10.1145/22145.22178 * Notes: The first paper on Zero Knowledge Proofs (ZKPs); opened a new field of research and ZKPs are widely used in cryptographic applications. ## 1986 ### Fiat, Amos, and Adi Shamir. "How to prove yourself: Practical solutions to identification and signature problems." CRYPTO'86. * [link to paper](https://mit6875.github.io/PAPERS/Fiat-Shamir.pdf) * Notes: Fiat-Shamir heuristics are a standard method to transform an interactive ZKP to a non-interactive one. Widely used in practice. ## 1992 ### Bellovin, Steven M., and Michael Merritt. "Encrypted key exchange: Password-based protocols secure against dictionary attacks." S&P. 1992. * [Link to paper](https://www.cs.columbia.edu/~smb/papers/neke.pdf) * Notes: first paper on password-authenticated key exchange (PAKE); opened a new field. ## 1999 ### Juels, Ari; Brainard, John. "Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks". NDSS, 1999. * [Link to paper](https://www.ndss-symposium.org/ndss1999/cryptographic-defense-against-connection-depletion-attacks/) * Notes: deployed in some practical applications e.g., [anubis](https://anubis.techaro.lol/docs/design/how-anubis-works) ## 2002 ### Kiayias, Aggelos, and Moti Yung. "Self-tallying elections and perfect ballot secrecy." PKC, 2002. * [Link to paper](https://link.springer.com/chapter/10.1007/3-540-45664-3_10) * Notes: first paper on decentralized e-voting with self-tallying; was a niche topic in 2002, but has become a main stream topic 20 years later in DAO voting (which is decentralized by nature) ## 2003 ### Daugman, John. "The importance of being random: statistical principles of iris recognition." Pattern recognition, 2003 * [Link to paper](https://www.cl.cam.ac.uk/~jgd1000/patrec.pdf) * Notes: The Daugman's method forms the basis of all public deployments of iris recognitions worldwide ## 2004 ### Chaum, David. Secret-ballot Receipts: True Voter-verifiable Elections, IEEE S&P, 2004 * https://ieeexplore.ieee.org/abstract/document/1264852 * Notes: First design for E2E verifiable e-voting; pushed forward research on E2E verifiable e-voting systems. ## 2008 ### Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system.", 2008 * [Link to paper](https://assets.pubpub.org/d8wct41f/31611263538139.pdf) * Notes: First paper on BitCoin; opened a new research field and an entirely new cryptocurrency industry ## 2009 ### Adida, Ben, et al. "Electing a university president using open-audit voting: Analysis of real-world use of Helios." EVT/WOTE, 2009 * [Link to paper](https://www.usenix.org/legacy/event/evtwote09/tech/full_papers/adida-helios.pdf) * Notes: first use of E2E e-voting in a real-world election; the Helios voting system used in some applications, e.g., IACR. ## 2017 ### Ashish Vaswani, et al. "Attention Is All You Need" NeurIPS, 2017 * [Link to paper](https://arxiv.org/abs/1706.03762) * Notes: First paper mentioning Transformer in AI, which is a landmark paper in machine learning. ## 2018 ### Bünz, Benedikt, et al. "Bulletproofs: Short proofs for confidential transactions and more." IEEE S&P, 2018. * [Link to paper](https://eprint.iacr.org/2017/1066.pdf) * Notes: BulletProof used in some applications, e.g., [Monero](https://www.getmonero.org/)