@online{ASan, title = {{AddressSanitizer} documentation}, author = {LLVM}, url = {http://clang.llvm.org/docs/AddressSanitizer.html}, urldate = {2017-04-16} } @online{LSan, title = {{LeakSanitizer} documentation}, author = {LLVM}, url = {http://clang.llvm.org/docs/LeakSanitizer.html}, urldate = {2017-04-16} } @online{BoostCpuTimer, title = {{Boost cpu timer} documentation}, author = {Boost}, url = {http://www.boost.org/doc/libs/1_63_0/libs/timer/doc/cpu_timers.html}, urldate = {2017-05-13} } @online{ValgrindCallgrind, title = {{Valgrind callgrind} documentation}, author = {Valgrind}, url = {http://valgrind.org/docs/manual/cl-manual.html}, urldate = {2018-08-19} } @online{protobuf-arena, title = {{google protobuf arena allocator} documentation}, author = {Google}, url = {https://developers.google.com/protocol-buffers/docs/reference/arenas}, urldate = {2017-05-28} } @article{Koblitz, title={Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz's method}, author={Bh, Padma and Chandravathi, D and Roja, P Prapoorna}, journal={International Journal of Computer Science and Engineering}, volume={2}, number={5}, pages={1904--1907}, fyear={2010} } @Inbook{cMix, author="Chaum, David and Das, Debajyoti and Javani, Farid and Kate, Aniket and Krasnova, Anna and De Ruiter, Joeri and Sherman, Alan T.", editor="Gollmann, Dieter and Miyaji, Atsuko and Kikuchi, Hiroaki", title="cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations", bookTitle="Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings", year="2017", publisher="Springer International Publishing", address="Cham", pages="557--578", abstract="We introduce cMix, a new approach to anonymous communications. Through a precomputation, the core cMix protocol eliminates all expensive real-time public-key operations---at the senders, recipients and mixnodes---thereby decreasing real-time cryptographic latency and lowering computational costs for clients. The core real-time phase performs only a few fast modular multiplications.", isbn="978-3-319-61204-1", doi="10.1007/978-3-319-61204-1_28", url="https://doi.org/10.1007/978-3-319-61204-1_28" } @article{chaum1981untraceable, title={Untraceable electronic mail, return addresses, and digital pseudonyms}, author={Chaum, David L}, journal={Communications of the ACM}, volume={24}, number={2}, pages={84--90}, year={1981}, publisher={ACM} } @article{goldschlag1999onion, title={Onion routing}, author={Goldschlag, David and Reed, Michael and Syverson, Paul}, journal={Communications of the ACM}, volume={42}, number={2}, pages={39--41}, year={1999}, publisher={ACM} } @inproceedings{Johnson:2013:UGR:2508859.2516651, author = {Johnson, Aaron and Wacek, Chris and Jansen, Rob and Sherr, Micah and Syverson, Paul}, title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries}, booktitle = {Proceedings of the 2013 ACM SIGSAC Conference on Computer \&\#38; Communications Security}, series = {CCS '13}, year = {2013}, isbn = {978-1-4503-2477-9}, location = {Berlin, Germany}, pages = {337--348}, numpages = {12}, url = {http://doi.acm.org/10.1145/2508859.2516651}, doi = {10.1145/2508859.2516651}, acmid = {2516651}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {anonymity, metrics, onion routing}, } @inproceedings{park1993efficient, title={Efficient anonymous channel and all/nothing election scheme}, author={Park, Choonsik and Itoh, Kazutomo and Kurosawa, Kaoru}, booktitle={Workshop on the Theory and Application of of Cryptographic Techniques}, pages={248--259}, year={1993}, organization={Springer} } @inproceedings{Bernstein:2013:EEP:2541806.2516734, author = {Bernstein, Daniel J. and Hamburg, Mike and Krasnova, Anna and Lange, Tanja}, title = {Elligator: elliptic-curve points indistinguishable from uniform random strings}, booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \&\#38; communications security}, series = {CCS '13}, year = {2013}, isbn = {978-1-4503-2477-9}, location = {Berlin, Germany}, pages = {967--980}, numpages = {14}, url = {http://doi.acm.org/10.1145/2508859.2516734}, doi = {10.1145/2508859.2516734}, acmid = {2516734}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {censorship circumvention, elliptic curves, injective maps}, } @article{galteland2016attacks, title={Attacks on cMix-Some Small Overlooked Details.}, author={Galteland, Herman and Mj{\o}lsnes, Stig Fr and Olimid, Ruxandra F}, journal={IACR Cryptology ePrint Archive}, volume={2016}, pages={729}, year={2016} } @article{zhang2015survey, title={A survey of network traffic generation}, author={Zhang, Junhui and Tang, Jiqiang and Zhang, Xu and Ouyang, Wen and Wang, Dongbin}, year={2015}, publisher={IET} } @inproceedings{zhu2004flow, title={On flow correlation attacks and countermeasures in mix networks}, author={Zhu, Ye and Fu, Xinwen and Graham, Bryan and Bettati, Riccardo and Zhao, Wei}, booktitle={International Workshop on Privacy Enhancing Technologies}, pages={207--225}, year={2004}, organization={Springer} } @article{jardine2018tor, title={Tor, what is it good for? Political repression and the use of online anonymity-granting technologies}, author={Jardine, Eric}, journal={New Media \& Society}, volume={20}, number={2}, pages={435--452}, year={2018}, publisher={SAGE Publications Sage UK: London, England} } @article{ugus2007performance, title={Performance of additive homomorphic EC-Elgamal encryption for TinyPEDS}, author={Ugus, Osman and Hessler, Alban and Westhoff, Dirk}, journal={6. Fachgespr{\"a}ch Sensornetzwerke}, pages={55}, year={2007} } @article{sunuwar2015elgamal, title={Elgamal Encryption using Elliptic Curve Cryptography}, author={Sunuwar, Rosy and Samal, Suraj Ketan}, journal={Cryptography and Computer Security, University of Nebraska, Lincoln}, year={2015} } @article{diffie1976new, title={New directions in cryptography}, author={Diffie, Whitfield and Hellman, Martin}, journal={IEEE transactions on Information Theory}, volume={22}, number={6}, pages={644--654}, year={1976}, publisher={IEEE} }