Your contributions are always welcome! Keep it sane and in line with the general direction of the list, which is helping security engineers and normal developers to use crypto properly, get broad context of how practical crypto works, is attacked, and should be implemented/used.
- Add the link: `- [paper-name](http://example.com/) - A short description ends with a period.` Mentioning authors in description is recommended, if there are too many - mention first 2 and "et al.".