@online{ASan, title = {{AddressSanitizer} documentation}, author = {LLVM}, url = {http://clang.llvm.org/docs/AddressSanitizer.html}, urldate = {2017-04-16} } @online{LSan, title = {{LeakSanitizer} documentation}, author = {LLVM}, url = {http://clang.llvm.org/docs/LeakSanitizer.html}, urldate = {2017-04-16} } @online{BoostCpuTimer, title = {{Boost cpu timer} documentation}, author = {Boost}, url = {http://www.boost.org/doc/libs/1_63_0/libs/timer/doc/cpu_timers.html}, urldate = {2017-05-13} } @online{protobuf-arena, title = {{google protobuf arena allocator} documentation}, author = {Google}, url = {https://developers.google.com/protocol-buffers/docs/reference/arenas}, urldate = {2017-05-28} } @article{Koblitz, title={Encoding and decoding of a message in the implementation of Elliptic Curve cryptography using Koblitz's method}, author={Bh, Padma and Chandravathi, D and Roja, P Prapoorna}, journal={International Journal of Computer Science and Engineering}, volume={2}, number={5}, pages={1904--1907}, fyear={2010} } @Inbook{cMix, author="Chaum, David and Das, Debajyoti and Javani, Farid and Kate, Aniket and Krasnova, Anna and De Ruiter, Joeri and Sherman, Alan T.", editor="Gollmann, Dieter and Miyaji, Atsuko and Kikuchi, Hiroaki", title="cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations", bookTitle="Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings", year="2017", publisher="Springer International Publishing", address="Cham", pages="557--578", abstract="We introduce cMix, a new approach to anonymous communications. Through a precomputation, the core cMix protocol eliminates all expensive real-time public-key operations---at the senders, recipients and mixnodes---thereby decreasing real-time cryptographic latency and lowering computational costs for clients. The core real-time phase performs only a few fast modular multiplications.", isbn="978-3-319-61204-1", doi="10.1007/978-3-319-61204-1_28", url="https://doi.org/10.1007/978-3-319-61204-1_28" } @article{chaum1981untraceable, title={Untraceable electronic mail, return addresses, and digital pseudonyms}, author={Chaum, David L}, journal={Communications of the ACM}, volume={24}, number={2}, pages={84--90}, year={1981}, publisher={ACM} } @article{goldschlag1999onion, title={Onion routing}, author={Goldschlag, David and Reed, Michael and Syverson, Paul}, journal={Communications of the ACM}, volume={42}, number={2}, pages={39--41}, year={1999}, publisher={ACM} } @inproceedings{Johnson:2013:UGR:2508859.2516651, author = {Johnson, Aaron and Wacek, Chris and Jansen, Rob and Sherr, Micah and Syverson, Paul}, title = {Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries}, booktitle = {Proceedings of the 2013 ACM SIGSAC Conference on Computer \&\#38; Communications Security}, series = {CCS '13}, year = {2013}, isbn = {978-1-4503-2477-9}, location = {Berlin, Germany}, pages = {337--348}, numpages = {12}, url = {http://doi.acm.org/10.1145/2508859.2516651}, doi = {10.1145/2508859.2516651}, acmid = {2516651}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {anonymity, metrics, onion routing}, } @inproceedings{park1993efficient, title={Efficient anonymous channel and all/nothing election scheme}, author={Park, Choonsik and Itoh, Kazutomo and Kurosawa, Kaoru}, booktitle={Workshop on the Theory and Application of of Cryptographic Techniques}, pages={248--259}, year={1993}, organization={Springer} } @inproceedings{Bernstein:2013:EEP:2541806.2516734, author = {Bernstein, Daniel J. and Hamburg, Mike and Krasnova, Anna and Lange, Tanja}, title = {Elligator: elliptic-curve points indistinguishable from uniform random strings}, booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \&\#38; communications security}, series = {CCS '13}, year = {2013}, isbn = {978-1-4503-2477-9}, location = {Berlin, Germany}, pages = {967--980}, numpages = {14}, url = {http://doi.acm.org/10.1145/2508859.2516734}, doi = {10.1145/2508859.2516734}, acmid = {2516734}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {censorship circumvention, elliptic curves, injective maps}, } @article{galteland2016attacks, title={Attacks on cMix-Some Small Overlooked Details.}, author={Galteland, Herman and Mj{\o}lsnes, Stig Fr and Olimid, Ruxandra F}, journal={IACR Cryptology ePrint Archive}, volume={2016}, pages={729}, year={2016} } @article{zhang2015survey, title={A survey of network traffic generation}, author={Zhang, Junhui and Tang, Jiqiang and Zhang, Xu and Ouyang, Wen and Wang, Dongbin}, year={2015}, publisher={IET} }