-
2
-
-
0037974466
-
The disadvantages of free mix routes and how to overcome them
-
(25-26 July, ICSI TR-00-011
-
Berthold, O., Pfitzmann, A., and Standtke, R. The disadvantages of free mix routes and how to overcome them. In Proc. Workshop on Design Issues in Anonymity and Unobservability (25-26 July 2000), ICSI TR-00-011, pp. 27-42.
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 27-42
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
4
-
-
0342880858
-
Studies in Secure Multiparty Computation and Applications
-
Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June, revised version
-
Canetti, R. Studies in Secure Multiparty Computation and Applications. PhD thesis, Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, June 1995. revised version.
-
(1995)
PhD thesis
-
-
Canetti, R.1
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the Association for Computing Machinery 24, 2 (Feb. 1981), 84-88.
-
(1981)
Communications of the Association for Computing Machinery 24
, vol.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional sender and recipient untraceability
-
Chaum, D. The Dining Cryptographers Problem: Unconditional sender and recipient untraceability. Journal of Cryptology 7, 1 (1988), 65-75.
-
(1988)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
7
-
-
33746088658
-
Efficient multiparty computations with dishonest minority
-
March, of Lecture Notes in Computer Science, Springer-Verlag
-
Cramer, R., Damgård, I., Dziembowski, S., Hirt, M., and Rabin, T. Efficient multiparty computations with dishonest minority. In Advances in Cryptology-EUROCRYPT99 (March 1999), vol. 1561 of Lecture Notes in Computer Science, Springer-Verlag, pp. 311-326.
-
(1999)
Advances in Cryptology-EUROCRYPT99
, vol.1561
, pp. 311-326
-
-
Cramer, R.1
Damgård, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
8
-
-
0010275933
-
-
Dai, W. Pipenet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 1998.
-
(1998)
Pipenet 1.1
-
-
Dai, W.1
-
10
-
-
84948958135
-
How to break a practical mix and design a new one
-
Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg
-
Desmedt, Y., and Kurosawa, K. How to break a practical mix and design a new one. In Advances in Cryptology - EUROCRYPT '2000 (2000), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg, pp. 557-572.
-
(2000)
Advances in Cryptology - EUROCRYPT '2000
, pp. 557-572
-
-
Desmedt, Y.1
Kurosawa, K.2
-
13
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
New York, NY 10036, USA, 1987), ACM, Ed., ACM Press
-
Goldreich, O., Micali, S., and Wigderson, A. How to play any mental game - A completeness theorem for protocols with honest majority. In Proceedings of the nineteenth annual ACM Symposium on Theory of Computing, New York City, May 25-27, 1987 (New York, NY 10036, USA, 1987), ACM, Ed., ACM Press, pp. 218-229.
-
Proceedings of the nineteenth annual ACM Symposium on Theory of Computing, New York City, May 25-27, 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Feb
-
Goldschlag, D., Reed, M., and Syverson, P. Onion routing for anonymous and private internet connections. Communications of the ACM (USA) 42, 2 (Feb. 1999), 39-41.
-
(1999)
Communications of the ACM (USA)
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
18
-
-
0002919433
-
Millimix: Mixing in small batches
-
DIMACS, June 10, Thu, 22 Jul 1999 23: 50: 00 GMT
-
Jakobsson, M., and Juels, A. Millimix: Mixing in small batches. Tech. Rep. 99-33, DIMACS, June 10 1999. Thu, 22 Jul 1999 23: 50: 00 GMT.
-
(1999)
Tech. Rep. 99-33
-
-
Jakobsson, M.1
Juels, A.2
-
19
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz, Ed., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Kocher, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology - CRYPTO’ 96 (1996), N. Koblitz, Ed., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, pp. 104-113.
-
(1996)
In Advances in Cryptology - CRYPTO’ 96
, pp. 104-113
-
-
Kocher, P.C.1
-
20
-
-
84944878354
-
-
The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA
-
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A. Handbook of applied cryptography. The CRC Press series on discrete mathematics and its applications. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA, 1997.
-
(1997)
Handbook of applied cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
21
-
-
84937415944
-
A length-invariant hybrid mix
-
Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg
-
Ohkubo, M., and Abe, M. A length-invariant hybrid mix. In Advances in Cryptology -ASIACRYPT '2000 (2000), Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Heidelberg, pp. 178-191.
-
(2000)
In Advances in Cryptology -ASIACRYPT '2000
, pp. 178-191
-
-
Ohkubo, M.1
Abe, M.2
-
23
-
-
0003056522
-
ISDN-MIXes: Untraceable communication with very small bandwidth overhead
-
Pfitzmann, A., Pfitzmann, B., and waidner, M. ISDN-MIXes: untraceable communication with very small bandwidth overhead. In Information Security, Proc. IFIP/Sec '91 (1991), pp. 245-258.
-
(1991)
Information Security, Proc. IFIP/Sec '91
, pp. 245-258
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
24
-
-
0027224328
-
Cryptographic defense against traffic analysis
-
San Diego, California, 16-18 May
-
Rackoff, C., and Simon, D. R. Cryptographic defense against traffic analysis. In Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing (San Diego, California, 16-18 May 1993), pp. 672-681.
-
(1993)
Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing
, pp. 672-681
-
-
Rackoff, C.1
Simon, D.R.2
-
25
-
-
0038311863
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
25-26 July, ICSITR-00-011
-
Raymond, J.-F. Traffic analysis: Protocols, attacks, design issues and open problems. In Proc. Workshop on Design Issues in Anonymity and Unobservability (25-26 July 2000), ICSITR-00-011, pp. 7-26.
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 7-26
-
-
Raymond, J.-F.1
-
26
-
-
0001777423
-
Anonymous Web transactions with crowds
-
Feb
-
Reiter, M. K., and Rubin, A. D. Anonymous Web transactions with crowds. Communications of the ACM 42, 2 (Feb. 1999), 32-48.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.K.1
Rubin, A.D.2
-
27
-
-
84947262990
-
Multiparty computation unconditionally secure against II2 adversary structures
-
McGill University, Montreal, Canada
-
Smith, A., and Stiglic, A. Multiparty computation unconditionally secure against II2 adversary structures. Cryptology SOCS-98.2, School of Computer Science, McGill University, Montreal, Canada, 1998.
-
(1998)
Cryptology SOCS-98.2, School of Computer Science
-
-
Smith, A.1
Stiglic, A.2
-
28
-
-
0038311861
-
Towards an analysis of onion routing security
-
25-26 July, ICSI RR-00-011, 248, 252
-
Syverson, P. F., Tsudik, G., Reed, M. G., and Landwehr, C. E. Towards an analysis of onion routing security. In Proc. Workshop on Design Issues in Anonymity and Unobservability (25-26 July 2000), ICSI RR-00-011, pp. 83-100. 248, 252
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 83-100
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
-
29
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
J.-J. Quisquater and J. Vande-walle, Eds., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Waidner, M. Unconditional sender and recipient untraceability in spite of active attacks. In Advances in Cryptology - EUROCRYPT’ 89 (1990), J.-J. Quisquater and J. Vande-walle, Eds., Lecture Notes in Computer Science, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, pp. 302-319.
-
(1990)
Advances in Cryptology - EUROCRYPT’ 89
, pp. 302-319
-
-
Waidner, M.1
-
30
-
-
85032863028
-
The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
-
10-13 Apr, J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer-Verlag, 1990
-
Waidner, M., and Pfitzmann, B. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Advances in Cryptology-EUROCRYPT89 (10-13 Apr. 1989), J.-J. Quisquater and J. Vandewalle, Eds., vol. 434 of Lecture Notes in Computer Science, Springer-Verlag, 1990, p. 690.
-
(1989)
In Advances in Cryptology-EUROCRYPT89
, pp. 690
-
-
Waidner, M.1
Pfitzmann, B.2
|