summaryrefslogtreecommitdiff
path: root/thesis.bib
diff options
context:
space:
mode:
Diffstat (limited to 'thesis.bib')
-rw-r--r--thesis.bib54
1 files changed, 48 insertions, 6 deletions
diff --git a/thesis.bib b/thesis.bib
index c49350f..7cb6f2b 100644
--- a/thesis.bib
+++ b/thesis.bib
@@ -36,12 +36,27 @@
fyear={2010}
}
-@inproceedings{cMix,
- title={cMix: Anonymization by high-performance scalable mixing},
- author={Chaum, David and Javani, Farid and Kate, Aniket and Krasnova, Anna and de Ruiter, Joeri and Sherman, Alan T and Das, Debajyoti},
- booktitle={Proceedings of ACM CCS},
- volume={2016},
- year={2016}
+@Inbook{cMix,
+ author="Chaum, David
+ and Das, Debajyoti
+ and Javani, Farid
+ and Kate, Aniket
+ and Krasnova, Anna
+ and De Ruiter, Joeri
+ and Sherman, Alan T.",
+ editor="Gollmann, Dieter
+ and Miyaji, Atsuko
+ and Kikuchi, Hiroaki",
+ title="cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations",
+ bookTitle="Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings",
+ year="2017",
+ publisher="Springer International Publishing",
+ address="Cham",
+ pages="557--578",
+ abstract="We introduce cMix, a new approach to anonymous communications. Through a precomputation, the core cMix protocol eliminates all expensive real-time public-key operations---at the senders, recipients and mixnodes---thereby decreasing real-time cryptographic latency and lowering computational costs for clients. The core real-time phase performs only a few fast modular multiplications.",
+ isbn="978-3-319-61204-1",
+ doi="10.1007/978-3-319-61204-1_28",
+ url="https://doi.org/10.1007/978-3-319-61204-1_28"
}
@article{chaum1981untraceable,
@@ -82,4 +97,31 @@
publisher = {ACM},
address = {New York, NY, USA},
keywords = {anonymity, metrics, onion routing},
+}
+
+@inproceedings{park1993efficient,
+ title={Efficient anonymous channel and all/nothing election scheme},
+ author={Park, Choonsik and Itoh, Kazutomo and Kurosawa, Kaoru},
+ booktitle={Workshop on the Theory and Application of of Cryptographic Techniques},
+ pages={248--259},
+ year={1993},
+ organization={Springer}
+}
+
+@inproceedings{Bernstein:2013:EEP:2541806.2516734,
+ author = {Bernstein, Daniel J. and Hamburg, Mike and Krasnova, Anna and Lange, Tanja},
+ title = {Elligator: elliptic-curve points indistinguishable from uniform random strings},
+ booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \&\#38; communications security},
+ series = {CCS '13},
+ year = {2013},
+ isbn = {978-1-4503-2477-9},
+ location = {Berlin, Germany},
+ pages = {967--980},
+ numpages = {14},
+ url = {http://doi.acm.org/10.1145/2508859.2516734},
+ doi = {10.1145/2508859.2516734},
+ acmid = {2516734},
+ publisher = {ACM},
+ address = {New York, NY, USA},
+ keywords = {censorship circumvention, elliptic curves, injective maps},
} \ No newline at end of file