-
1
-
-
84958975323
-
Two practical and provably secure block ciphers: BEARS and LION
-
Dieter Gollmann, editor, FSE, of, Springer
-
Ross J. Anderson and Eli Biham. Two Practical and Provably Secure Block Ciphers: BEARS and LION. In Dieter Gollmann, editor, FSE, volume 1039 of Lecture Notes in Computer Science, pages 113-120. Springer, 1996.
-
(1996)
FSE, Volume 1039 of Lecture Notes in Computer Science
, pp. 113-120
-
-
Anderson, R.J.1
Biham, E.2
-
2
-
-
33751508709
-
Recommendation for key management
-
National Institute of Standards and Technology Special Publication, May
-
Elaine Barker, William Barker, William Burr, William Polk, and Miles Smid. Recommendation for Key Management-Part 1: General (Revised). National Institute of Standards and Technology Special Publication 800-57, May 2006.
-
(2006)
Part 1: General (Revised)
, pp. 800-857
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
3
-
-
33745965912
-
Curve25519: New diffie-hellman speed records
-
Daniel J. Bernstein. Curve25519: New Diffie-Hellman Speed Records. In Public Key Cryptography 2006, pages 207-228, 2006.
-
(2006)
Public Key Cryptography 2006
, pp. 207-228
-
-
Bernstein, D.J.1
-
4
-
-
84937549115
-
The disadvantages of free mix routes and how to overcome them
-
H. Federrath, editor, Springer-Verlag, LNCS 2009, July
-
Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke. The disadvantages of free MIX routes and how to overcome them. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30-45. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
5
-
-
33745174191
-
A formal treatment of onion routing
-
Victor Shoup, editor, Springer-Verlag, LNCS 3621, August
-
Jan Camenisch and Anna Lysyanskaya. A formal treatment of onion routing. In Victor Shoup, editor, Proceedings of CRYPTO 2005, pages 169-187. Springer-Verlag, LNCS 3621, August 2005.
-
(2005)
Proceedings of CRYPTO 2005
, pp. 169-187
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
6
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Ran Canetti. Universally composable security: A new paradigm for cryptographic protocols. In FOCS, pages 136-145, 2001.
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
11
-
-
77049083422
-
Blending different latency traffic with alphamixing
-
George Danezis and Philippe Golle, editors, Cambridge, UK, June, Springer
-
Roger Dingledine, Andrei Serjantov, and Paul Syverson. Blending different latency traffic with alphamixing. In George Danezis and Philippe Golle, editors, Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), pages 245-257, Cambridge, UK, June 2006. Springer.
-
(2006)
Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)
, pp. 245-257
-
-
Dingledine, R.1
Serjantov, A.2
Syverson, P.3
-
15
-
-
35248844472
-
Provably secure public-key encryption for length-preserving chaumian mixes
-
Springer-Verlag, LNCS 2612
-
Bodo Möller. Provably secure public-key encryption for length-preserving chaumian mixes. In Proceedings of CT-RSA 2003. Springer-Verlag, LNCS 2612, 2003.
-
(2003)
Proceedings of CT-RSA 2003
-
-
Möller, B.1
-
17
-
-
33847688060
-
Multicollision attacks on some generalized sequential hash functions
-
February
-
Mridul Nandi and Douglas R. Stinson. Multicollision Attacks on Some Generalized Sequential Hash Functions. IEEE Transactions on Information Theory, 53(2):759-767, February 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.2
, pp. 759-767
-
-
Nandi, M.1
Stinson, D.R.2
-
18
-
-
85032859691
-
How to break the direct RSA-implementation of MIXes
-
Springer-Verlag, LNCS 434
-
Birgit Pfitzmann and Andreas Pfitzmann. How to break the direct RSA-implementation of MIXes. In Proceedings of EUROCRYPT 1989. Springer-Verlag, LNCS 434, 1990.
-
(1990)
Proceedings of EUROCRYPT 1989
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120- 126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
Springer- Verlag, LNCS 2578, October
-
Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In Fabien Petitcolas, editor, Proceedings of Information Hiding Workshop (IH 2002). Springer- Verlag, LNCS 2578, October 2002.
-
(2002)
Fabien Petitcolas, Editor, Proceedings of Information Hiding Workshop (IH 2002)
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
21
-
-
50249168331
-
Breaking and provably fixing minx
-
Nikita Borisov and Ian Goldberg, editors, Leuven, Belgium, July, Springer
-
Eric Shimshock, Matt Staats, and Nick Hopper. Breaking and Provably Fixing Minx. In Nikita Borisov and Ian Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 99-114, Leuven, Belgium, July 2008. Springer.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 99-114
-
-
Shimshock, E.1
Staats, M.2
Hopper, N.3
|