Changes

Jump to: navigation, search

Timeline of Wei Dai publications

4,034 bytes added, 13:06, 3 July 2018
no edit summary
{| class="sortable wikitable"
! Year !! Month and date !! Format !! Venue !! Title !! Summary !! Comment count !! Word count
|-
| || || HTML file || Personal website || [http://www.weidai.com/lucas.html "Lucas Sequences in Cryptography"] || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/ssh2-attack.txt "an attack against SSH2 protocol"] || Also posted to sci.crypt and the IETF SSH working group mailing list. || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/freedom-attacks.txt "two attacks against a PipeNet-like protocol once used by the Freedom service"] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/monopoly-memory.txt "Why good memory could be bad for you: game theoretic analysis of a monopolist with memory"] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/smart-losers.txt "Why cleverness could be bad for you: a game where the smarter players lose"] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/qm-interpretation.txt "A really simple interpretation of quantum mechanics"] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/stock-options.txt "How to make more money with your employee stock options at no extra risk"] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/black-holes.txt "What should advanced civilizations do with waste heat? Use black holes as heat sinks."] (no formal title so using description on website) || || ||
|-
| || || Text file || Personal website || [http://www.weidai.com/measuring.txt "An alternative to intellectual property: government funding of information goods based on measured value"] (no formal title so using description on website) || || ||
|-
| 1994 || {{dts|August 19}} || Email || Cypherpunks || [https://cypherpunks.venona.com/date/1994/08/msg00800.html "trusted time stamping"], [https://cypherpunks.venona.com/date/1994/08/msg00799.html "timestamp.c"], [https://cypherpunks.venona.com/date/1994/08/msg00822.html "timestamp.c mangled"] || || ||
|-
| 1998 || {{dts|November 26}} || Email || Cypherpunks || [https://cypherpunks.venona.com/date/1998/11/msg00941.html "PipeNet 1.1 and b-money"] || || ||
|-
| 1998 || {{dts|November 26}} || Text file || || [http://www.weidai.com/pipenet.txt "PipeNet 1.1"] || The text file containing a description of PipeNet 1.1, as mentioned in an email on Cypherpunks. || ||
|-
| 1999 || {{dts|January 9}} || Email || everything-list || [https://riceissa.github.io/everything-list-1998-2009/0227.html "information content of measures"] || || ||
|-
| 2006 || {{dts|April 9}} || Email || everything-list || [https://www.mail-archive.com/everything-list@googlegroups.com/msg09119.html "why can't we erase information?"] || || ||
|-
| 2007 || {{dts|April}} || Text file || Ted Krovetz's website || [http://www.fastcrypto.org/vmac/draft-krovetz-vmac-01.txt "VMAC: Message Authentication Code using Universal Hashing"] || Co-authored with Ted Krovetz. || ||
|-
| 2007 || {{dts|September 26}} || Email || everything-list || [https://www.mail-archive.com/everything-list@googlegroups.com/msg13817.html "against UD+ASSA, part 1"] || || ||
|-
| 2008 || {{dts|September 7}} || Email || SL4 || [http://sl4.org/archive/0809/19325.html "Bayesian rationality vs. voluntary mergers"] || || ||
|-
| 2009 || {{dts|April 2}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/lJitV7RXtkU "GCM with 2KB/key tables"] || || ||
|-
| 2009 || {{dts|April 3}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/aydqOs1rTyo "GCC compile farm"] || || ||
|-
| 2009 || {{dts|April 3}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/XQfVnPU145I "tips for instruction scheduling?"] || || ||
|-
| 2009 || {{dts|April 6}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/BSESmQp0VGQ "AES register saving tricks"] || || ||
|-
| 2009 || {{dts|April 7}} || Blog post || LessWrong || [http://lesswrong.com/lw/6r/newcombs_problem_vs_oneshot_prisoners_dilemma/ "Newcomb's Problem vs. One-Shot Prisoner's Dilemma"] || || 15 ||
|-
| 2009 || {{dts|April 10}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/Z1zxHM3ebec "SSE2 Comba multiplication"] || || ||
|-
| 2009 || {{dts|April 16}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/5KD2Y6QqPvk "secrets of GMP 4.3"] || || ||
|-
| 2009 || {{dts|April 16}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/1rne1Y79UZo "Jacobi quartic form curves"] || || ||
|-
| 2009 || {{dts|May 5}} || Email || crypto-optimization || [https://groups.google.com/forum/#!topic/crypto-optimization/-XHUYae7zUs "constant-time extended GCD?"] || || ||
|-
| 2009 || {{Dts|May 7}} || Blog post || LessWrong || [http://lesswrong.com/lw/f6/epistemic_vs_instrumental_rationality_case_of_the/ "Epistemic vs. Instrumental Rationality: Case of the Leaky Agent"] || || 19 ||
| 2010 || {{dts|February 9}} || Blog post || LessWrong || [http://lesswrong.com/lw/1r9/shut_up_and_divide/ "Shut Up and Divide?"] || || 258 ||
|-
| 2010 || {{dts|February 19}} || Blog post || LessWrong || [http://lesswrong.com/lw/1s5/explicit_optimization_of_global_strategy_fixing_a/ "Explicit Optimization of Global Strategy (Fixing a Bug in UDT1)"] || This post describes what would be known as UDT 1.1.<ref>{{cite web |url=https://www.greaterwrong.com/posts/pu3ddLSZjjmiiqQfh/another-take-on-agent-foundations-formalizing-zero-shot/comment/TJtwakAfL7wwoaDKS |title=Wei_Dai comments on Another take on agent foundations: formalizing zero-shot reasoning |author=Wei Dai |date=July 1, 2018 |accessdate=July 3, 2018 |publisher=LessWrong}}</ref> || 38 ||
|-
| 2010 || {{dts|March 2}} || Blog post || LessWrong || [http://lesswrong.com/lw/1um/individual_vs_group_epistemic_rationality/ "Individual vs. Group Epistemic Rationality"] || || 54 ||
===What the timeline is still missing===
* There are a bunch of files on http://www.weidai.com/ but they don't have dates on them so it's hard to know where to put them. (Internet Archive would help with this to some extent.)
* There are some good comment threads that involve Wei on LW, EA Forum, Medium, and IAFF. I think some of these should be included. Some of these are now listed at https://causeprioritization.org/List_of_discussions_between_Paul_Christiano_and_Wei_Dai
* article cited in http://www.ibiblio.org/weidai/temp/Provable_Security.pdf
* [http://www.weidai.com/ Wei Dai's personal website]
* [http://lesswrong.com/user/Wei_Dai/overview/ Wei Dai's LessWrong account]
* [https://wiki.lesswrong.com/wiki/Special:Contributions/Wei_Dai LessWrong Wiki contributions]
* [http://effective-altruism.com/user/Wei_Dai/ Wei Dai's Effective Altruism Forum account]
* [https://medium.com/@weidai Wei Dai's Medium account]

Navigation menu