-
1
-
-
84866887908
-
Provably secure and practical onion routing
-
M. Backes, I. Goldberg, A. Kate, and E. Mohammadi, "Provably secure and practical onion routing," IACR Cryptology ePrint Archive, Report 2011/308, 2012.
-
(2012)
IACR Cryptology EPrint Archive, Report 2011/308
-
-
Backes, M.1
Goldberg, I.2
Kate, A.3
Mohammadi, E.4
-
2
-
-
84937550984
-
Provably secur password-authenticated key exchange using diffie-hellman
-
V. Boyko, P. D. MacKenzie, and S. Patel, "Provably Secur Password-Authenticated Key Exchange Using Diffie-Hellman," in EUROCRYPT, 2000, pp. 156-171.
-
(2000)
EUROCRYPT
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
5
-
-
38049064364
-
Universally composable security with global setup
-
R. Canetti, Y. Dodis, R. Pass, and S. Walfish, "Universally composable security with global setup," in Proc. 4th Theo of Cryptography Conference (TCC), 2007, pp. 61-85.
-
(2007)
Proc. 4th Theo of Cryptography Conference (TCC)
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
6
-
-
74049117962
-
Certificateless onion routing
-
D. Catalano, D. Fiore, and R. Gennaro, "Certificateless onion routing," in Proc. 16th ACM Conference on Comput and Communication Security (CCS), 2009, pp. 151-160.
-
(2009)
Proc. 16th ACM Conference on Comput and Communication Security (CCS)
, pp. 151-160
-
-
Catalano, D.1
Fiore, D.2
Gennaro, R.3
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges," Des. Codes Cryptography, vol. 2, no. 2, pp. 107-125, 1992.
-
(1992)
Des. Codes Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
9
-
-
85084161366
-
Tor: The second-generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," in Proc. 13th USENIX Security Symposium (USENIX), 2004, pp. 303-320.
-
(2004)
Proc. 13th USENIX Security Symposium (USENIX)
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
10
-
-
38549171987
-
A model onion routing with provable anonymity
-
J. Feigenbaum, A. Johnson, and P. F. Syverson, "A model onion routing with provable anonymity," in Proc. 11th Conference on Financial Cryptography and Data Security (FC), 2007, pp. 57-71.
-
(2007)
Proc. 11th Conference on Financial Cryptography and Data Security (FC)
, pp. 57-71
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.F.3
-
11
-
-
50249115176
-
Probabilistic analysis of onion routing in a black-box model
-
J. Feigenbaum, A. Johnson, and P. F. Syverson, "Probabilistic analysis of onion routing in a black-box model," in Proc. 6th ACM Workshop on Privacy in the Electronic Society (WPES), 2007, pp. 1-10.
-
(2007)
Proc. 6th ACM Workshop on Privacy in the Electronic Society (WPES)
, pp. 1-10
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.F.3
-
14
-
-
84876167337
-
Anonymity and one-way authentication in key exchange protocols
-
proposal for Tor
-
I. Goldberg, D. Stebila, and B. Ustaoglu, "Anonymity and one-way authentication in key exchange protocols," Designs, Codes and Cryptography, pp. 1-25, 2012, proposal for Tor: https://gitweb.torproject.org/torspec.git/ blob/HEAD: /proposals/ideas/xxx-ntor-handshake.txt.
-
(2012)
Designs, Codes and Cryptography
, pp. 1-25
-
-
Goldberg, I.1
Stebila, D.2
Ustaoglu, B.3
-
15
-
-
84880888233
-
Session-key generation using human passwords only
-
O. Goldreich and Y. Lindell, "Session-Key Generation Using Human Passwords Only," in CRYPTO, 2001, pp. 408-432.
-
(2001)
CRYPTO
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
16
-
-
84955557456
-
Hiding routing information
-
D. M. Goldschlag, M. Reed, and P. Syverson, "Hiding Routing Information," in Proc. 1st Workshop on Information Hiding, 1996, pp. 137-150.
-
(1996)
Proc. 1st Workshop on Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.2
Syverson, P.3
-
17
-
-
0005063385
-
Onion routing
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Onion Routing," Commun. ACM, vol. 42, no. 2, pp. 39-41, 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
18
-
-
79960051711
-
Possibility and impossibility results for selective decommitments
-
D. Hofheinz, "Possibility and Impossibility Results for Selective Decommitments," J. Cryptology, vol. 24, no. 3, pp. 470-516, 2011.
-
(2011)
J. Cryptology
, vol.24
, Issue.3
, pp. 470-516
-
-
Hofheinz, D.1
-
21
-
-
38149092452
-
Pairing-based onion routing
-
A. Kate, G. M. Zaverucha, and I. Goldberg, "Pairing-Based Onion Routing," in Proc. 7th Privacy Enhancing Technologies Symposium (PETS), 2007, pp. 95-112.
-
(2007)
Proc. 7th Privacy Enhancing Technologies Symposium (PETS)
, pp. 95-112
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
22
-
-
78651394431
-
Pairing-based onion routing with improved forward secrecy
-
A. Kate, G. M. Zaverucha, and I. Goldberg, "Pairing-Based Onion Routing with Improved Forward Secrecy," ACM Trans. Inf. Syst. Secur., vol. 13, no. 4, p. 29, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4
, pp. 29
-
-
Kate, A.1
Zaverucha, G.M.2
Goldberg, I.3
-
23
-
-
31844446595
-
A Formalization of anonymity and onion routing
-
S. Mauw, J. Verschuren, and E. P. de Vink, "A Formalization of Anonymity and Onion Routing," in Proc. 9th European Symposium on Research in Computer Security (ESORICS), 2004, pp. 109-124.
-
(2004)
Proc. 9th European Symposium on Research in Computer Security (ESORICS)
, pp. 109-124
-
-
Mauw, S.1
Verschuren, J.2
De Vink, E.P.3
-
25
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J-SAC, vol. 16, no. 4, pp. 482-494, 1998.
-
(1998)
IEEE J-SAC
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
26
-
-
3042662497
-
Probabilistic analysis of an anonymity system
-
V. Shmatikov, "Probabilistic analysis of an anonymity system," Journal of Computer Security, vol. 12, no. 3-4, pp. 355-377, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
27
-
-
84937565289
-
Towards an analysis of onion routing security
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an Analysis of Onion Routing Security," in Proc. Workshop on Design Issues in Anonymity and Unobservability (WDIAU), 2000, pp. 96-114.
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability (WDIAU)
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
28
-
-
84866896914
-
-
accessed Nov 2011
-
"The Tor Project," https://www.torproject.org/, 2003, accessed Nov 2011.
-
(2003)
The Tor Project
-
-
-
30
-
-
72849140470
-
Effective attacks in the tor authentication protocol
-
Y. Zhang, "Effective attacks in the tor authentication protocol," in NSS '09, 2009, pp. 81-86.
-
(2009)
NSS '09
, pp. 81-86
-
-
Zhang, Y.1
|