diff options
Diffstat (limited to 'thesis.bib')
| -rw-r--r-- | thesis.bib | 54 |
1 files changed, 48 insertions, 6 deletions
@@ -36,12 +36,27 @@ fyear={2010} } -@inproceedings{cMix, - title={cMix: Anonymization by high-performance scalable mixing}, - author={Chaum, David and Javani, Farid and Kate, Aniket and Krasnova, Anna and de Ruiter, Joeri and Sherman, Alan T and Das, Debajyoti}, - booktitle={Proceedings of ACM CCS}, - volume={2016}, - year={2016} +@Inbook{cMix, + author="Chaum, David + and Das, Debajyoti + and Javani, Farid + and Kate, Aniket + and Krasnova, Anna + and De Ruiter, Joeri + and Sherman, Alan T.", + editor="Gollmann, Dieter + and Miyaji, Atsuko + and Kikuchi, Hiroaki", + title="cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations", + bookTitle="Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings", + year="2017", + publisher="Springer International Publishing", + address="Cham", + pages="557--578", + abstract="We introduce cMix, a new approach to anonymous communications. Through a precomputation, the core cMix protocol eliminates all expensive real-time public-key operations---at the senders, recipients and mixnodes---thereby decreasing real-time cryptographic latency and lowering computational costs for clients. The core real-time phase performs only a few fast modular multiplications.", + isbn="978-3-319-61204-1", + doi="10.1007/978-3-319-61204-1_28", + url="https://doi.org/10.1007/978-3-319-61204-1_28" } @article{chaum1981untraceable, @@ -82,4 +97,31 @@ publisher = {ACM}, address = {New York, NY, USA}, keywords = {anonymity, metrics, onion routing}, +} + +@inproceedings{park1993efficient, + title={Efficient anonymous channel and all/nothing election scheme}, + author={Park, Choonsik and Itoh, Kazutomo and Kurosawa, Kaoru}, + booktitle={Workshop on the Theory and Application of of Cryptographic Techniques}, + pages={248--259}, + year={1993}, + organization={Springer} +} + +@inproceedings{Bernstein:2013:EEP:2541806.2516734, + author = {Bernstein, Daniel J. and Hamburg, Mike and Krasnova, Anna and Lange, Tanja}, + title = {Elligator: elliptic-curve points indistinguishable from uniform random strings}, + booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \&\#38; communications security}, + series = {CCS '13}, + year = {2013}, + isbn = {978-1-4503-2477-9}, + location = {Berlin, Germany}, + pages = {967--980}, + numpages = {14}, + url = {http://doi.acm.org/10.1145/2508859.2516734}, + doi = {10.1145/2508859.2516734}, + acmid = {2516734}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {censorship circumvention, elliptic curves, injective maps}, }
\ No newline at end of file |
