Craig S. Wright

Affiliations:
  • nChain, London, UK
  • Charles Sturt University, School of Computing and Mathematics, Sydney, NSW, Australia


According to our database1, Craig S. Wright authored at least 31 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2010, "For contributions to parallel magnetic resonance imaging methods and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Cognitive Castes: Artificial Intelligence, Epistemic Stratification, and the Dissolution of Democratic Discourse.
CoRR, July, 2025

Immutability Does Not Guarantee Trust: A Formal and Logical Refutation.
CoRR, July, 2025

Mathematical Modelling of Oscillatory Dynamics in Circular Traffic Systems.
CoRR, July, 2025

Resolving CAP Through Automata-Theoretic Economic Design: A Unified Mathematical Framework for Real-Time Partition-Tolerant Systems.
CoRR, July, 2025

Epistemic Scarcity: The Economics of Unresolvable Unknowns.
CoRR, July, 2025

Safe Low Bandwidth SPV: A Formal Treatment of Simplified Payment Verification Protocols and Security Bounds.
CoRR, July, 2025

Peer Review as Structured Commentary: Immutable Identity, Public Dialogue, and Reproducible Scholarship.
CoRR, June, 2025

Institutional Noise, Strategic Deviation, and Intertemporal Collapse: A Formal Model of Miner Behaviour under Protocol Uncertainty.
CoRR, June, 2025

Rational Miner Behaviour, Protocol Stability, and Time Preference: An Austrian and Game-Theoretic Analysis of Bitcoin's Incentive Environment.
CoRR, June, 2025

The Autonomy of the Lightning Network: A Mathematical and Economic Proof of Structural Decoupling from BTC.
CoRR, June, 2025

Bayesian Evolutionary Swarm Architecture: A Formal Epistemic System Grounded in Truth-Based Competition.
CoRR, June, 2025

Beyond Prediction - Structuring Epistemic Integrity in Artificial Reasoning Systems.
CoRR, June, 2025

Bayesian Epistemology with Weighted Authority: A Formal Architecture for Truth-Promoting Autonomous Scientific Reasoning.
CoRR, June, 2025

The Redundancy of Full Nodes in Bitcoin: A Network-Theoretic Demonstration of Miner-Centric Propagation Topologies.
CoRR, June, 2025

On Immutable Memory Systems for Artificial Agents: A Blockchain-Indexed Automata-Theoretic Framework Using ECDH-Keyed Merkle Chains.
CoRR, June, 2025

Formal Security Analysis of SPV Clients Versus Home-Based Full Nodes in Bitcoin-Derived Systems.
CoRR, June, 2025

2023
Using the Singular Value Decomposition to Generate Composite NFTs.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2019
A Proof of Turing Completeness in Bitcoin Script.
Proceedings of the Intelligent Systems and Applications, 2019

Bitcoin: A Total Turing Machine.
Proceedings of the Intelligent Systems and Applications, 2019

A Distribution Protocol for Dealerless Secret Distribution.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Decentralized Autonomous Corporations.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Systems and Methods for Implementing Deterministic Finite Automata (DFA) via a Blockchain.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Agent-based Turing Complete Transactions integrating feedback within a Blockchain System.
Proceedings of the 16th International Multi-Conference on Systems, Signals & Devices, 2019

2018
Modeling a Double-Spending Detection System for the Bitcoin Network.
CoRR, 2018

From Bitcoin to Bitcoin Cash: a network analysis.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

2017
Sustainable blockchain-enabled services: Smart contracts.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2011
Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

A Quantitative Analysis into the Economics of Correcting Software Bugs.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Compliance or Security, What Cost? (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software.
Proceedings of the Trusted Systems - Second International Conference, 2010

2008
Overwriting Hard Drive Data: The Great Wiping Controversy.
Proceedings of the Information Systems Security, 4th International Conference, 2008


  Loading...