% % Magic fields: % www_section -- the topic used under 'topics.html' % www_{ps|pdf|ps_gz|txt|html|abstract}_url -- link for text/abstract of % an entry. % www_important -- set for important entries % www_remarks -- annotation for an entry %% List of sections @string{mix = "Mix Networks: Design"} @string{mixattacks = "Mix Networks: Attacks"} @string{stream = "Stream-based anonymity"} @string{traffic = "Traffic analysis"} @string{pub = "Anonymous publication"} @string{nym = "Pseudonymity"} %% Journals and proceedings: used by reference @Proceedings{eurocrypt-02, booktitle = "Proceedings of Eurocrypt 2002", month = may year = {2002}, bookurl = {http://www.ec2002.tue.nl/}, } %% Section: Mix Networks: Design @Article{chaum-mix, author = {David Chaum}, title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, journal = {Communications of the ACM}, year = {1982}, volume = {4}, number = {2}, month = {February}, note = {\url{http://www.eskimo.com/\{}~weidai/mix-net.txt}}, www_section = mix, www_txt_url = {http://www.eskimo.com/~weidai/mix-net.txt}, www_important = {1}, www_remarks = {Chaum's paper that has all the big ideas.} } @Misc{mixminion-spec, author = {George Danezis and Roger Dingledine and Nick Mathewson}, title = {Type {III} ({M}ixminion) Mix Protocol Specification}, howpublished = {}, www_section = mix, www_txt_url = "http://mixminion.net/minion-spec.txt", } @InProceedings{BM:mixencrypt, author = {Bodo M{\"o}ller}, title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, booktitle = {{CT-RSA} 2003}, publisher = {Springer-Verlag, LNCS 2612}, year = 2003, www_section = mix, www_pdf_url = "http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/mixencrypt-ct-rsa2003.pdf", } @Misc{mixmaster-spec, author = {Ulf M\"oller and Lance Cottrell}, title = {Mixmaster {P}rotocol --- {V}ersion 2}, howpublished = {Unfinished draft, January 2000}, www_section = mix, www_txt_url = "http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-mixmaster2-protocol-00.txt", } @InProceedings{abe, author = {Masayuki Abe}, title = {Universally Verifiable {MIX} With Verification Work Independent of The Number of {MIX} Servers}, booktitle = {{EUROCRYPT} 1998}, year = {1998}, publisher = {Springer-Verlag, LNCS 1403}, www_section = mix, } @InProceedings{desmedt, author = {Yvo Desmedt and Kaoru Kurosawa}, title = {How To Break a Practical {MIX} and Design a New One}, booktitle = {{EUROCRYPT} 2000}, year = {2000}, publisher = {Springer-Verlag, LNCS 1803}, www_section = mix, www_html_url = "http://citeseer.nj.nec.com/447709.html", } @InProceedings{hybrid-mix, author = {Miyaku Ohkubo and Masayuki Abe}, title = {A {L}ength-{I}nvariant {H}ybrid {MIX}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000}, year = {2000}, publisher = {Springer-Verlag, LNCS 1976}, www_section = mix, } @InProceedings{jakobsson-optimally, author = "Markus Jakobsson and Ari Juels", title = "An Optimally Robust Hybrid Mix Network (Extended Abstract)", booktitle = {Principles of Distributed Computing - {PODC} '01}, year = "2001", publisher = {ACM Press}, www_section = mix, www_html_url = "http://citeseer.nj.nec.com/492015.html", } @InProceedings{kesdogan, author = {Dogan Kesdogan and M. Egner and T. B\"uschkes}, title = {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open System}, booktitle = {Information Hiding (IH 1998)}, year = {1998}, publisher = {Springer-Verlag, LNCS 1525}, www_section = mix, www_pdf_url = "http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf", } @InProceedings{flash-mix, author = {Markus Jakobsson}, title = {Flash {M}ixing}, booktitle = {Principles of Distributed Computing - {PODC} '99}, year = {1999}, publisher = {ACM Press}, www_section = mix, www_html_url = "http://citeseer.nj.nec.com/jakobsson99flash.html", } @InProceedings{babel, author = {C. Gulcu and G. Tsudik}, title = {Mixing {E}-mail With {B}abel}, booktitle = {Network and Distributed Security Symposium - {NDSS} '96}, year = {1996}, publisher = {IEEE}, www_section = mix, www_html_url = "http://citeseer.nj.nec.com/2254.html", } @Article{remailer-history, author = {Sameer Parekh}, title = {Prospects for Remailers}, journal = {First Monday}, volume = {1}, number = {2}, month = {August}, year = {1996}, www_section = mix, www_html_url = "http://www.firstmonday.dk/issues/issue2/remailers/", } @Misc{remailer-history-old, author = {Tim May}, title = {Description of early remailer history}, howpublished = {Archived e-mail} www_section = mix, www_html_url = "http://www.inet-one.com/cypherpunks/dir.1996.08.29-1996.09.04/msg00431.html", } @InProceedings{mix-acc, author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar}, title = {{A Reputation System to Increase MIX-net Reliability}}, booktitle = {Information Hiding (IH 2001)}, pages = {126--141}, year = 2001, editor = {Ira S. Moskowitz}, publisher = {Springer-Verlag, LNCS 2137}, www_section = mix, www_ps_url = "http://freehaven.net/doc/mix-acc/mix-acc.ps", www_pdf_url = "http://freehaven.net/doc/mix-acc/mix-acc.pdf", } @InProceedings{casc-rep, author = {Roger Dingledine and Paul Syverson}, title = {{Reliable MIX Cascade Networks through Reputation}}, booktitle = {Financial Cryptography (FC '02)}, year = 2002, editor = {Matt Blaze}, publisher = {Springer-Verlag, LNCS (forthcoming)}, www_section = mix, www_ps_url = "http://freehaven.net/doc/casc-rep/casc-rep.ps", www_pdf_url = "http://freehaven.net/doc/casc-rep/casc-rep.pdf", } %% Section: Mix Networks: Attacks @InProceedings{pfitzmann90how, author = "Birgit Pfitzmann and Andreas Pfitzmann", title = "How to Break the Direct {RSA}-Implementation of {MIXes}", booktitle = {Eurocrypt 89}, publisher = {Springer-Verlag, LNCS 434}, year = {1990}, www_section = mixattacks, www_abstract_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90", www_ps_gz_url = "http://www.semper.org/sirene/lit/abstr90.html#PfPf_90", } @InProceedings{back01, author = {Adam Back and Ulf M\"oller and Anton Stiglic}, title = {Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems}, booktitle = {Information Hiding (IH 2001)}, pages = {245--257}, year = 2001, editor = {Ira S. Moskowitz}, publisher = {Springer-Verlag, LNCS 2137}, www_section = mixattacks, www_pdf_url = "http://www.cypherspace.org/adam/pubs/traffic.pdf", } @Misc{mixmaster-attacks, author = {Lance Cottrell}, title = {Mixmaster and Remailer Attacks}, www_section = mixattacks, www_html_url = {http://www.obscura.com/~loki/remailer/remailer-essay.html}, } @InProceedings{mitkuro, author = {M. Mitomo and K. Kurosawa}, title = {{Attack for Flash MIX}}, booktitle = {{ASIACRYPT} 2000}, year = {2000}, publisher = {Springer-Verlag, LNCS 1976}, www_section = mixattacks, www_html_url = "http://citeseer.nj.nec.com/450148.html", } %% Section : nymservers @InProceedings{nym-alias-net, author = {David Mazi\`eres and M. Frans Kaashoek}, title = {{The Design, Implementation and Operation of an Email Pseudonym Server}}, booktitle = {$5^{th}$ ACM Conference on Computer and Communications Security (CCS'98)}, year = 1998, publisher = {ACM Press}, www_section = nym, www_ps_gz_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.ps.gz", www_ps_gz_url = "ftp://cag.lcs.mit.edu/pub/dm/papers/mazieres:pnym.pdf", } @techreport{freedom-nyms, author = {Russell Samuels}, title = {Untraceable Nym Creation on the {F}reedom {N}etwork}, year = {1999}, month = {November}, day = {21}, type = {White Paper} institution = {Zero Knowledge} number = {11} www_section = nym, www_html_url = "http://www.freedom.net/products/whitepapers/white11.html", } %% Section: Traffic analysis @InProceedings{rackoff93cryptographic, author = {Charles Rackoff and Daniel R. Simon}, title = {Cryptographic Defense Against Traffic Analysis}, booktitle = {{ACM} Symposium on Theory of Computing}, pages = {672--681}, year = {1993}, www_section = traffic, www_html_url = "http://research.microsoft.com/crypto/dansimon/me.htm", } @InProceedings{raymond00, author = {J. F. Raymond}, title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability}, year = 2000, month = {July}, pages = {10-29}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = traffic, } @InProceedings{trickle02, author = {Andrei Serjantov and Roger Dingledine and Paul Syverson}, title = {From a Trickle to a Flood: Active Attacks on Several Mix Types}, booktitle = {Information Hiding (IH 2002)}, year = {2002}, editor = {Fabien Petitcolas}, publisher = {Springer-Verlag, LNCS (forthcoming)}, www_section = traffic, www_ps_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.ps", www_pdf_url = "http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf", } @InProceedings{langos02, author = {Oliver Berthold and Heinrich Langos}, title = {Dummy Traffic Against Long Term Intersection Attacks}, booktitle = {Privacy Enhancing Technologies (PET 2002)}, year = {2002}, editor = {Roger Dingledine and Paul Syverson}, publisher = {Springer-Verlag, LNCS 2482}, www_section = traffic, } @InProceedings{disad-free-routes, author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, title = {The disadvantages of free {MIX} routes and how to overcome them}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability}, pages = {30--45}, year = 2000, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = traffic, www_pdf_url = "http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/disadvantages_berthold.pdf", } %% Section: Anonymous publication @InProceedings{freehaven-berk, author = {Roger Dingledine and Michael J. Freedman and David Molnar}, title = {The Free Haven Project: Distributed Anonymous Storage Service}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability}, year = {2000}, month = {July}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = pub, www_ps_url = "http://freehaven.net/doc/berk/freehaven-berk.ps" } @InProceedings{freenet, author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong}, title = {Freenet: {A} Distributed Anonymous Information Storage and Retrieval System}, booktitle = {Workshop on Design Issues in Anonymity and Unobservability}, pages = {46--66}, year = {2000}, www_section = pub, www_html_url = "http://citeseer.nj.nec.com/clarke00freenet.html", } @InProceedings{garay97secure, author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin}, title = {Secure distributed storage and retrieval}, booktitle = {11th International Workshop, WDAG '97}, pages = {275--289}, year = {1997}, publisher = {Springer-Verlag, LNCS 1320}, www_section = pub, www_html_url = "http://citeseer.nj.nec.com/garay97secure.html", } @InProceedings{publius, author = {Marc Waldman and Aviel Rubin and Lorrie Cranor}, title = {Publius: {A} robust, tamper-evident, censorship-resistant and source-anonymous web publishing system}, booktitle = {Proc. 9th USENIX Security Symposium}, pages = {59--72}, year = {2000}, month = {August}, www_section = pub, www_html_url = "http://citeseer.nj.nec.com/waldman00publius.html", } %% Section: Stream-based anonymity @InProceedings{onion-discex00, author = {Paul Syverson and Michael Reed and David Goldschlag}, title = {{O}nion {R}outing Access Configurations}, booktitle = {DARPA Information Survivability Conference and Exposition (DISCEX 2000)}, year = {2000}, publisher = {IEEE CS Press}, pages = {34--40}, volume = {1}, www_section = stream, www_abstact_url = "http://www.onion-router.net/Publications.html", www_ps_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps", www_ps_gz_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps.gz", www_pdf_url = "http://www.onion-router.net/Publications/DISCEX-2000.ps", } @InProceedings{syverson_2000, author = {Paul F. Syverson and Gene Tsudik and Michael G. Reed and Carl E. Landwehr}, title = {Towards an Analysis of Onion Routing Security}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability}, year = 2000, month = {July}, pages = {96--114}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, www_section = stream, www_html_url = "http://citeseer.nj.nec.com/syverson00towards.html" } @InProceedings{web-mix, author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell}, title = {Web {MIX}es: A system for anonymous and unobservable {I}nternet access}, booktitle = {Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability}, editor = {H. Federrath}, publisher = {Springer-Verlag, LNCS 2009}, pages = {115--129}, year = 2000, www_section = stream, } @Article{crowds, author = {Michael K. Reiter and Aviel D. Rubin}, title = {Crowds: Anonymity for Web Transactions}, journal = {{DIMACS} Technical Report}, volume = {97}, number = {15}, month = {April}, year = {1997}, www_section = stream, www_html_url = "http://citeseer.nj.nec.com/284739.html", } @Misc{freedom, author = {Zero Knowledge Systems}, title = {Freedom Version 2 White Papers}, www_section = stream, www_html_url = {http://www.freedom.net/info/whitepapers/}, } @Misc{realtime-mix, author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, title = {{Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol}}, howpublished = {IEEE Journal on Selected Areas in Communications, 1998.}, www_section = stream, www_html_url = "http://www.zurich.ibm.com/security/publications/1998.html", } %% Section: Misc @inproceedings{rao-pseudonymity, author = "Josyula R. Rao and Pankaj Rohatgi", title = "Can Pseudonymity Really Guarantee Privacy?", booktitle = "Proceedings of the Ninth USENIX Security Symposium", year = {2000}, month = Aug, publisher = {USENIX}, pages = "85--96", www_pdf_url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf", } @misc{echolot, author = {Peter Palfrader}, title = {Echolot: a pinger for anonymous remailers}, www_html_url = "http://www.palfrader.org/echolot/", } @Misc{hashcash, author = {Adam Back}, title = {Hash cash}, www_html_url = http://www.cypherspace.org/~adam/hashcash/", } @InProceedings{oreilly-acc, author = {Roger Dingledine and Michael J. Freedman and David Molnar}, title = {Accountability}, booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive Technology}, year = {2001}, publisher = {O'Reilly and Associates}, } @InProceedings{SK, author = {Joe Kilian and Kazue Sako}, title = {Receipt-Free {MIX}-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth}, booktitle = {EUROCRYPT '95}, year = {1995}, publisher = {Springer-Verlag}, } @Misc{rprocess, author = {RProcess}, title = {Selective Denial of Service Attacks}, www_html_url = "http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html", } @misc{neochaum, author = {Tim May}, title = {Payment mixes for anonymity}, howpublished = {Archived e-mail} www_html_url = "http://www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html", } @misc{pidaho, author = {Joel McNamara}, title = {{P}rivate {I}daho}, www_html_url = "http://www.eskimo.com/~joelm/pi.html", } @misc{potato, author = {RProcess}, title = {{P}otato {S}oftware}, www_html_url = "http://www.skuz.net/potatoware/", } @misc{helsingius, author = {J. Helsingius}, title = {Johan Helsingius closes his Internet remailer} howpublished = {Press Release}, month = aug, year = {1996}, www_html_url = "http://www.penet.fi/press-english.html", } @InProceedings{PIK, author = {C. Park and K. Itoh and K. Kurosawa}, title = {Efficient anonymous channel and all/nothing election scheme}, booktitle = {Advances in Cryptology -- {EUROCRYPT} '93}, year = {1993} pages = {248--259}, publisher = {Springer-Verlag, LNCS 765}, } @Article{riordan-schneier, author = {James Riordan and Bruce Schneier}, title = {A Certified E-mail Protocol with No Trusted Third Party}, journal = {13th Annual Computer Security Applications Conference}, month = {December}, year = {1998}, www_html_url = "http://www.counterpane.com/certified-email.html", } @Misc{recovery, author = {Miguel Castro and Barbara Liskov}, title = {Proactive Recovery in a Byzantine-Fault-Tolerant System}, www_pdf_url = "http://www.pmg.lcs.mit.edu/~castro/application/recovery.pdf", } @Misc{advogato, author = {Raph Levien}, title = {Advogato's Trust Metric}, www_html_url = "http://www.advogato.org/trust-metric.html", } @PhdThesis{malkin-thesis, author = {Tal Malkin}, school = {{MIT}}, title = {Private {I}nformation {R}etrieval}, year = {2000}, www_html_url = "http://toc.lcs.mit.edu/~tal/pubs.html", } @InProceedings{zhou96certified, author = {Zhou and Gollmann}, title = {Certified Electronic Mail}, booktitle = {{ESORICS: European Symposium on Research in Computer Security}}, publisher = {Springer-Verlag, LNCS 1146}, year = {1996}, www_html_url = "http://citeseer.nj.nec.com/zhou96certified.html", } %% These have little to do with anonymity, so I'm commenting them out. %% %% @InProceedings{BEAR-LIONESS, %% author = {Ross Anderson and Eli Biham}, %% title = {Two Practical and Provably Secure Block Ciphers: {BEAR} and {LION}}, %% booktitle = {International Workshop on Fast Software Encryption}, %% year = {1996}, %% publisher = {Springer-Verlag}, %% note = {\url{http://citeseer.nj.nec.com/anderson96two.html}}, %% } %% %% @Misc{SPC, %% author = {Daniel Bleichenbacher and Anand Desai}, %% title = {A Construction of a Super-Pseudorandom Cipher}, %% howpublished = {Manuscript}, %% } %% %% % Would a more recent reference for SPRPs be more useful? %% @Article{sprp, %% author = {Michael Luby and Charles Rackoff}, %% title = {How to Construct Pseudorandom Permutations from %% Pseudorandom Functions}, %% journal = {SIAM Journal on Computing}, %% year = {1988}, %% volume = {17}, %% number = {2}, %% pages = {373--386}, %% } %% %% @Misc{TLS, %% author = {T. Dierks and C. Allen}, %% title = {The {TLS} {P}rotocol --- {V}ersion 1.0}, %% howpublished = {IETF RFC 2246}, %% month = {January}, %% year = {1999}, %% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc2246.txt}}, %% } %% %% @Misc{SMTP, %% author = {J. Postel}, %% title = {Simple {M}ail {T}ransfer {P}rotocol}, %% howpublished = {IETF RFC 2821 (also STD0010)}, %% month = {April}, %% year = {2001}, %% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc2821.txt}}, %% } %% %% @Misc{IMAP, %% author = {M. Crispin}, %% title = {Internet {M}essage {A}ccess {P}rotocol --- {V}ersion 4rev1}, %% howpublished = {IETF RFC 2060}, %% month = {December}, %% year = {1996}, %% note = {\url{http://www.rfc-editor.org/rfc/rfc2060.txt}}, %% } %% %% @Misc{POP3, %% author = {J. Myers and M. Rose}, %% title = {Post {O}ffice {P}rotocol --- {V}ersion 3}, %% howpublished = {IETF RFC 1939 (also STD0053)}, %% month = {May}, %% year = {1996}, %% note = {\newline \url{http://www.rfc-editor.org/rfc/rfc1939.txt}}, %% } %% %% @InProceedings{shuffle, %% author = {C. Andrew Neff}, %% title = {A Verifiable Secret Shuffle and its Application to E-Voting}, %% booktitle = {8th ACM Conference on Computer and Communications %% Security (CCS-8)}, %% pages = {116--125}, %% year = 2001, %% editor = {P. Samarati}, %% month = {November}, %% publisher = {ACM Press}, %% note = {\url{http://www.votehere.net/ada_compliant/ourtechnology/ %% technicaldocs/shuffle.pdf}}, %% } %% %% @InProceedings{dolev91, %% author = {Danny Dolev and Cynthia Dwork and Moni Naor}, %% title = {Non-Malleable Cryptography}, %% booktitle = {23rd ACM Symposium on the Theory of Computing (STOC)}, %% pages = {542--552}, %% year = 1991, %% note = {Updated version at %% \url{http://citeseer.nj.nec.com/dolev00nonmalleable.html}}, %% } %% %% @TechReport{rsw96, %% author = {Ronald L. Rivest and Adi Shamir and David A. Wagner}, %% title = {Time-lock puzzles and timed-release Crypto}, %% year = 1996, %% type = {MIT LCS technical memo}, %% number = {MIT/LCS/TR-684}, %% month = {February}, %% note = {\newline \url{http://citeseer.nj.nec.com/rivest96timelock.html}}, %% } %% %% @InProceedings{boneh00, %% author = {Dan Boneh and Moni Naor}, %% title = {Timed Commitments}, %% booktitle = {Advances in Cryptology -- {CRYPTO} 2000}, %% pages = {236--254}, %% year = 2000, %% publisher = {Springer-Verlag, LNCS 1880}, %% note = {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}}, %% } %% %% @InProceedings{goldschlag98, %% author = {David M. Goldschlag and Stuart G. Stubblebine}, %% title = {Publicly Verifiable Lotteries: Applications of %% Delaying Functions}, %% booktitle = {Financial Cryptography, FC'98}, %% pages = {214--226}, %% year = 1998, %% publisher = {Springer-Verlag, LNCS 1465}, %% note = {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}}, %% } %% %% @InProceedings{syverson98, %% author = {Paul Syverson}, %% title = {Weakly Secret Bit Commitment: Applications to %% Lotteries and Fair Exchange}, %% booktitle = {Computer Security Foundations Workshop (CSFW11)}, %% pages = {2--13}, %% year = 1998, %% address = {Rockport Massachusetts}, %% month = {June}, %% publisher = {IEEE CS Press}, %% note = {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}}, %% } %% %% @Misc{shoup-iso, %% author = {Victor Shoup}, %% title = {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)}, %% note = {Revised December 20, 2001. \url{http://www.shoup.net/papers/}}, %% } %% %% @Misc{shoup-oaep, %% author = {Victor Shoup}, %% title = {{OAEP} Reconsidered}, %% howpublished = {{IACR} e-print 2000/060}, %% note = {\newline \url{http://eprint.iacr.org/2000/060/}}, %% } %% %% @Misc{oaep-still-alive, %% author = {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern}, %% title = {{RSA}-{OAEP} is Still Alive!}, %% howpublished = {{IACR} e-print 2000/061}, %% note = {\newline \url{http://eprint.iacr.org/2000/061/}}, %% } %% %% @Article{mitzenm-loss, %% author = {G. Louth and M. Mitzenmacher and F.P. Kelly}, %% title = {Computational Complexity of Loss Networks}, %% journal = {Theoretical Computer Science}, %% year = {1994}, %% volume = {125}, %% pages = {45-59}, %% note = {\newline \url{http://citeseer.nj.nec.com/louth94computational.html}}, %% } %% %% @InProceedings{han, %% author = {Yongfei Han}, %% title = {Investigation of non-repudiation protocols}, %% booktitle = {ACISP '96}, %% year = {1996}, %% publisher = {Springer-Verlag}, %% } %% %% @InProceedings{PShuffle, %% author = {Jun Furukawa and Kazue Sako}, %% title = {An Efficient Scheme for Proving a Shuffle}, %% editor = {Joe Kilian}, %% booktitle = {CRYPTO 2001}, %% year = {2001}, %% publisher = {Springer-Verlag, LNCS 2139}, %% } %% %% @InProceedings{OAEP, %% author = {M. Bellare and P. Rogaway}, %% year = {1994}, %% booktitle = {EUROCRYPT '94}, %% title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With %% {RSA}}, %% publisher = {Springer-Verlag}, %% note = {\newline \url{http://www-cse.ucsd.edu/users/mihir/papers/oaep.html}}, %% } %% %% @Misc{timmay, %% author = {Tim May}, %% title = {Cyphernomicon}, %% note = {\newline \url{http://www2.pro-ns.net/~crypto/cyphernomicon.html}}, %% } %% %% @Misc{pgpfaq, %% key = {PGP}, %% title = {{PGP} {FAQ}}, %% note = {\newline \url{http://www.faqs.org/faqs/pgp-faq/}}, %% } %% %% @Misc{rabin-ida, %% author = {Michael O. Rabin}, %% title = {Efficient Dispersal of Information for security, load balancing, %% and fault tolerance}, %% booktitle = {Journal of the ACM}, %% year = {1989}, %% volume = {36}, %% number = {2}, %% series = {335--348}, %% month = {April}, %% } %% %% %% @Article{raghavan87randomized, %% author = {P. Raghavan and C. Thompson}, %% title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs}, %% journal = {Combinatorica}, %% volume = {7}, %% pages = {365--374}, %% year = {1987}, %% } %% %% @InProceedings{leighton91fast, %% author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and %% Clifford Stein and Eva Tardos and Spyros Tragoudas}, %% title = {Fast Approximation Algorithms for Multicommodity Flow Problems}, %% booktitle = {{ACM} Symposium on Theory of Computing}, %% pages = {101-111}, %% year = {1991}, %% note = {\newline \url{http://citeseer.nj.nec.com/91073.html}}, %% } %% %% @Misc{pk-relations, %% author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway}, %% title = {Relations Among Notions of Security for Public-Key Encryption %% Schemes}, %% howpublished = { %% Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462. %% Springer-Verlag, 1998. %% Full version available from \newline \url{http://www-cse.ucsd.edu/users/mihir/}}, %% } %% %%