-
1
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
33745174191
-
A Formal Treatment of Onion Routing
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: A Formal Treatment of Onion Routing. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 169-187. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 169-187
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
3
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 4(2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
33845437589
-
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing
-
IEEE Computer Society Press, Los Alamitos
-
Chien, H., Lin, R.: Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. In: SUTC'06. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 520-529. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
SUTC'06. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 520-529
-
-
Chien, H.1
Lin, R.2
-
5
-
-
38149017551
-
-
Dai, W.: PipeNet 1.1. Post to Cypherpunks mailing list (November 1998)
-
Dai, W.: PipeNet 1.1. Post to Cypherpunks mailing list (November 1998)
-
-
-
-
6
-
-
38149102159
-
-
Dingledine, R., Mathewson, N.: The Tor Protocol Specification (accessed February 2007), http://tor.eff.org/svn/trunk/doc/spec/tor-spec.txt
-
Dingledine, R., Mathewson, N.: The Tor Protocol Specification (accessed February 2007), http://tor.eff.org/svn/trunk/doc/spec/tor-spec.txt
-
-
-
-
8
-
-
29244438183
-
Provably secure non-interactive key distribution based on pairings
-
Dupont, R., Enge, A.: Provably secure non-interactive key distribution based on pairings. Discrete Applied Mathematics 154(2), 270-276 (2006)
-
(2006)
Discrete Applied Mathematics
, vol.154
, Issue.2
, pp. 270-276
-
-
Dupont, R.1
Enge, A.2
-
9
-
-
34547358080
-
Advances in Elliptic Curve Cryptography
-
Blake, I, ed, Cambridge University Press, Cambridge
-
Blake, I. (ed.): Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series, vol. 317. Cambridge University Press, Cambridge (2005)
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
-
-
-
10
-
-
0038349207
-
-
Frcedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: CCS 2002. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, Washington, DC (2002)
-
Frcedman, M.J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer. In: CCS 2002. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, Washington, DC (2002)
-
-
-
-
11
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 537-554. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
12
-
-
33846862213
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
-
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Journal of Cryptology 20(1), 51-83 (2007)
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
13
-
-
72849147698
-
-
Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 316-331. Springer, Heidelberg (2006)
-
Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
84955557456
-
Hiding Routing Information
-
Anderson, R, ed, Information Hiding, Springer, Heidelberg
-
Goldschlag, D., Reed, M., Syverson, P.: Hiding Routing Information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
15
-
-
38149139908
-
Pairing-Based Onion Routing
-
2007-08, Centre for Applied Cryptographic Research , Available at
-
Kate, A., Zaverucha, G.M., Goldberg, I.: Pairing-Based Onion Routing. Technical Report CACR, 2007-08, Centre for Applied Cryptographic Research (2007), Available at http://www.cacr.math.uwaterloo.ca/techreports/2007/ cacr2007-08.pdf
-
(2007)
Technical Report CACR
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
16
-
-
84943807207
-
Toward Secure Key Distribution in Truly Ad-Hoc Networks
-
IEEE Computer Society Press, Los Alamitos
-
Khalili, A., Katz, J., Arbaugh, W.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks 2003, pp. 342-346. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Workshop on Security and Assurance in Ad-Hoc Networks
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
17
-
-
31344437951
-
Pairing-Based Cryptography at High Security Levels
-
Smart, N.P, ed, Cryptography and Coding, Springer, Heidelberg
-
Koblitz, N., Menezes, A.: Pairing-Based Cryptography at High Security Levels. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 13-36. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3796
, pp. 13-36
-
-
Koblitz, N.1
Menezes, A.2
-
18
-
-
38149126822
-
-
Lynn, B.: PBC Library - The Pairing-Based Cryptography Library (accessed February 2007), http://crypto.stanford.edu/pbc/
-
Lynn, B.: PBC Library - The Pairing-Based Cryptography Library (accessed February 2007), http://crypto.stanford.edu/pbc/
-
-
-
-
19
-
-
31844446595
-
-
Mauw, S., Verschuren, J., de Vink, E.: A Formalization of Anonymity and Onion Routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, 3193, pp. 109-124. Springer, Heidelberg (2004)
-
Mauw, S., Verschuren, J., de Vink, E.: A Formalization of Anonymity and Onion Routing. In: Samarati, P., Ryan, P.Y A, Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 109-124. Springer, Heidelberg (2004)
-
-
-
-
20
-
-
85030330304
-
Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field
-
ACM Press, New York
-
Menezes, A., Okamoto, T., Vanstone, S.: Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. In: STOC 1991. Proc. of the twenty-third annual ACM Symposium on Theory of Computing, pp. 80-89. ACM Press, New York (1991)
-
(1991)
STOC 1991. Proc. of the twenty-third annual ACM Symposium on Theory of Computing
, pp. 80-89
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
21
-
-
84944878354
-
-
1st edn. CRC Press, Boca Raton, USA
-
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, 1st edn. CRC Press, Boca Raton, USA (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
22
-
-
35248844472
-
-
Möller, B.: Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. In: Joye, M. (ed.) CT-RSA 2003. LNCS, 2612, Springer, Heidelberg (2003)
-
Möller, B.: Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, Springer, Heidelberg (2003)
-
-
-
-
23
-
-
26944471143
-
-
Okamoto, E., Okamoto, T.: Cryptosystems Based on Elliptic Curve Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI2005. LNCS (LNAI), 3558, pp. 13-23. Springer, Heidelberg (2005)
-
Okamoto, E., Okamoto, T.: Cryptosystems Based on Elliptic Curve Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI2005. LNCS (LNAI), vol. 3558, pp. 13-23. Springer, Heidelberg (2005)
-
-
-
-
24
-
-
38349040011
-
-
Øverlier, L., Syverson, P.: Improving efficiency and simplicity of Tor circuit establishment and hidden services. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 134-152. Springer, Heidelberg (2007)
-
Øverlier, L., Syverson, P.: Improving efficiency and simplicity of Tor circuit establishment and hidden services. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 134-152. Springer, Heidelberg (2007)
-
-
-
-
25
-
-
85030460443
-
A Threshold Cryptosystem without a Trusted Party
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Pedersen, T.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522-526. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.1
-
26
-
-
38049184891
-
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
-
ICUCT, Springer, Heidelberg
-
Rahman, S., Inomata, A., Okamoto, T., Mambo, M., Okamoto, E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. In: ICUCT 2006. LNCS, vol. 4412, pp. 140-149. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4412
, pp. 140-149
-
-
Rahman, S.1
Inomata, A.2
Okamoto, T.3
Mambo, M.4
Okamoto, E.5
-
27
-
-
0032074579
-
Anonymous Connections and Onion Routing
-
Reed, M., Syverson, P., Goldschlag, D.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications 16(4), 482-494 (1998)
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
28
-
-
20444437836
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
Washington, DC, USA November
-
Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: WPES 2002. Proceedings of the Workshop on Privacy in the Electronic Society, Washington, DC, USA (November 2002)
-
(2002)
WPES 2002. Proceedings of the Workshop on Privacy in the Electronic Society
-
-
Rennhard, M.1
Plattner, B.2
-
30
-
-
33749041735
-
Practical Security for Disconnected Nodes
-
NPSec, pp, IEEE Computer Society Press, Los Alamitos
-
Seth, A., Keshav, S.: Practical Security for Disconnected Nodes. In: IEEE ICNP Workshop on Secure Network Protocols, 2005 (NPSec), pp. 31-36. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
IEEE ICNP Workshop on Secure Network Protocols
, pp. 31-36
-
-
Seth, A.1
Keshav, S.2
-
31
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
32
-
-
84937565289
-
Towards an Analysis of Onion Routing Security
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an Analysis of Onion Routing Security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
33
-
-
38149136214
-
-
The Tor Project. Tor: anonymity online (accessed February 2007), http://tor.eff.org/
-
The Tor Project. Tor: anonymity online (accessed February 2007), http://tor.eff.org/
-
-
-
-
34
-
-
84945129491
-
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Verheul, E.: Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 195-210. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 195-210
-
-
Verheul, E.1
|