BibTeX records: David Chaum

download as .bib file

@article{DBLP:journals/iacr/ChaumCCYA23,
  author       = {David Chaum and
                  Bernardo Cardoso and
                  William Carter and
                  Mario Yaksetig and
                  Baltasar Aroso},
  title        = {Phoenixx: Linear consensus with random sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1262},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1262},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumCCYA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChaumYSR22,
  author       = {David Chaum and
                  Mario Yaksetig and
                  Alan T. Sherman and
                  Joeri de Ruiter},
  title        = {{UDM:} Private user discovery with minimal information disclosure},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {347--379},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1911876},
  doi          = {10.1080/01611194.2021.1911876},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChaumYSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChaumLY22,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {WOTSwana: {A} Generalized \emph{S}\({}_{\mbox{ leeve }}\) Construction
                  for Multiple Proofs of Ownership},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {491--511},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_24},
  doi          = {10.1007/978-3-031-29371-9\_24},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChaumLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/ChaumLY22,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Tweakable S\({}_{\mbox{leeve}}\): {A} Novel S\({}_{\mbox{leeve}}\)
                  Construction Based on Tweakable Hash Functions},
  booktitle    = {3rd International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2022, Vilamoura, Portugal, July 12-14, 2022},
  series       = {Lecture Notes in Operations Research},
  pages        = {169--186},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18679-0\_10},
  doi          = {10.1007/978-3-031-18679-0\_10},
  timestamp    = {Tue, 11 Jul 2023 16:47:12 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/ChaumLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumLY22,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig},
  title        = {Tweakable Sleeve: {A} Novel Sleeve Construction based on Tweakable
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/888},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumCCLNPSYYZZ22,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Chao Liu and
                  Mahdi Nejadgholi and
                  Bart Preneel and
                  Alan T. Sherman and
                  Mario Yaksetig and
                  Zeyuan Yin and
                  Filip Zag{\'{o}}rski and
                  Bingsheng Zhang},
  title        = {VoteXX: {A} Solution to Improper Influence in Voter-Verifiable Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1212},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1212},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumCCLNPSYYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumLY22a,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig},
  title        = {WOTSwana: {A} Generalized Sleeve Construction for Multiple Proofs
                  of Ownership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1623},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1623},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumLY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChaumLYC21,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig and
                  William Carter},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {W-OTS\({}^{\mbox{+}}\) Up My Sleeve! {A} Hidden Secure Fallback for
                  Cryptocurrency Wallets},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  pages        = {195--219},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3\_8},
  doi          = {10.1007/978-3-030-78372-3\_8},
  timestamp    = {Wed, 09 Jun 2021 10:50:14 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChaumLYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-00254,
  author       = {David Chaum and
                  Christian Grothoff and
                  Thomas Moser},
  title        = {How to Issue a Central Bank Digital Currency},
  journal      = {CoRR},
  volume       = {abs/2103.00254},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.00254},
  eprinttype    = {arXiv},
  eprint       = {2103.00254},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-00254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumLYC21,
  author       = {David Chaum and
                  Mario Larangeira and
                  Mario Yaksetig and
                  William Carter},
  title        = {{W-OTS(+)} up my Sleeve! {A} Hidden Secure Fallback for Cryptocurrency
                  Wallets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/872},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumLYC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChaumDJKKRS17,
  author       = {David Chaum and
                  Debajyoti Das and
                  Farid Javani and
                  Aniket Kate and
                  Anna Krasnova and
                  Joeri de Ruiter and
                  Alan T. Sherman},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {557--578},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_28},
  doi          = {10.1007/978-3-319-61204-1\_28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChaumDJKKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidChaumJKKRS16,
  author       = {David Chaum and
                  Farid Javani and
                  Aniket Kate and
                  Anna Krasnova and
                  Joeri de Ruiter and
                  Alan T. Sherman},
  title        = {cMix: Anonymization byHigh-Performance Scalable Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidChaumJKKRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZagorskiCCCEV13,
  author       = {Filip Zag{\'{o}}rski and
                  Richard Carback and
                  David Chaum and
                  Jeremy Clark and
                  Aleksander Essex and
                  Poorvi L. Vora},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting
                  System},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {441--457},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_28},
  doi          = {10.1007/978-3-642-38980-1\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZagorskiCCCEV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZagorskiCCCEV13,
  author       = {Filip Zag{\'{o}}rski and
                  Richard Carback and
                  David Chaum and
                  Jeremy Clark and
                  Aleksander Essex and
                  Poorvi L. Vora},
  title        = {Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting
                  System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZagorskiCCCEV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShermanFCC11,
  author       = {Alan T. Sherman and
                  Russell A. Fink and
                  Richard Carback and
                  David Chaum},
  editor       = {Hovav Shacham and
                  Vanessa Teague},
  title        = {Scantegrity {III:} Automatic Trustworthy Receipts, Highlighting Over/Under
                  Votes, and Full Voter Verifiability},
  booktitle    = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/evtwote-11/scantegrity-iii-automatic-trustworthy-receipts-highlighting-overunder-votes},
  timestamp    = {Mon, 01 Feb 2021 08:42:50 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShermanFCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/ChaumFNPRVZ11,
  author       = {David Chaum and
                  Alex Florescu and
                  Mridul Nandi and
                  Stefan Popoveniuc and
                  Jan Rubio and
                  Poorvi L. Vora and
                  Filip Zag{\'{o}}rski},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {Paperless Independently-Verifiable Voting},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_9},
  doi          = {10.1007/978-3-642-32747-6\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/ChaumFNPRVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaumCCEPRRSSV10,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Corrections to scantegrity {II:} end-to-end verifiability by voters
                  of optical scan elections through confirmation codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {1},
  pages        = {194},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2040672},
  doi          = {10.1109/TIFS.2010.2040672},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ev/ShermanCCCEHMPRSSV10,
  author       = {Alan T. Sherman and
                  Richard Carback and
                  David Chaum and
                  Jeremy Clark and
                  Aleksander Essex and
                  Paul S. Herrnson and
                  Travis Mayberry and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Emily Shen and
                  Bimal Sinha and
                  Poorvi L. Vora},
  editor       = {Robert Krimmer and
                  R{\"{u}}diger Grimm},
  title        = {Scantegrity Mock Election at Takoma Park},
  booktitle    = {Electronic Voting 2010, {EVOTE} 2010, 4th International Conference,
                  Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik
                  and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz,
                  Austria},
  series       = {{LNI}},
  volume       = {{P-167}},
  pages        = {45--61},
  publisher    = {{GI}},
  year         = {2010},
  url          = {https://dl.gi.de/handle/20.500.12116/19503},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ev/ShermanCCCEHMPRSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarbackCCCEHMPRSSV10,
  author       = {Richard Carback and
                  David Chaum and
                  Jeremy Clark and
                  John Conway and
                  Aleksander Essex and
                  Paul S. Herrnson and
                  Travis Mayberry and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity {II} Municipal Election at Takoma Park: The First {E2E}
                  Binding Governmental Election with Ballot Privacy},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {291--306},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Carback.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarbackCCCEHMPRSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/PopoveniucCCEC10,
  author       = {Stefan Popoveniuc and
                  Jeremy Clark and
                  Richard Carback and
                  Aleksander Essex and
                  David Chaum},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Securing Optical-Scan Voting},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {357--369},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_22},
  doi          = {10.1007/978-3-642-12980-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/PopoveniucCCEC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/KelseyRMC10,
  author       = {John Kelsey and
                  Andrew Regenscheid and
                  Tal Moran and
                  David Chaum},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Attacking Paper-Based {E2E} Voting Systems},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {370--387},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_23},
  doi          = {10.1007/978-3-642-12980-3\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wote/KelseyRMC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wote/2010lncs,
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3},
  doi          = {10.1007/978-3-642-12980-3},
  isbn         = {978-3-642-12979-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/2010lncs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChaumHPV09,
  author       = {David Chaum and
                  Benjamin Hosp and
                  Stefan Popoveniuc and
                  Poorvi L. Vora},
  title        = {Accessible Voter-Verifiability},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {283--291},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902894946},
  doi          = {10.1080/01611190902894946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChaumHPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RivestCPRSV09,
  author       = {Ronald L. Rivest and
                  David Chaum and
                  Bart Preneel and
                  Aviel D. Rubin and
                  Donald G. Saari and
                  Poorvi L. Vora},
  title        = {Guest editorial: special issue on electronic voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {593--596},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034721},
  doi          = {10.1109/TIFS.2009.2034721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity {II:} end-to-end verifiability by voters of optical scan
                  elections through confirmation codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {611--627},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034919},
  doi          = {10.1109/TIFS.2009.2034919},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ChaumECCPSV08,
  author       = {David Chaum and
                  Aleksander Essex and
                  Richard Carback and
                  Jeremy Clark and
                  Stefan Popoveniuc and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {3},
  pages        = {40--46},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.70},
  doi          = {10.1109/MSP.2008.70},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ChaumECCPSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/PattersonSC08,
  author       = {Meredith L. Patterson and
                  Len Sassaman and
                  David Chaum},
  editor       = {Elizabeth F. Churchill and
                  Rachna Dhamija},
  title        = {Freezing More Than Bits: Chilling Effects of the {OLPC} {XO} Security
                  Model},
  booktitle    = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA,
                  USA, April 14, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/upsec08/tech/full\_papers/patterson/patterson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/PattersonSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChaumCCEPRRSS08,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Aleksander Essex and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Emily Shen and
                  Alan T. Sherman},
  editor       = {David L. Dill and
                  Tadayoshi Kohno},
  title        = {Scantegrity {II:} End-to-End Verifiability for Optical Scan Election
                  Systems using Invisible Ink Confirmation Codes},
  booktitle    = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July
                  28-29, 2008, San Jose, CA, USA, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/evt08/tech/full\_papers/chaum/chaum.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChaumCCEPRRSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7311,
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07311/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Executive Summary -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1294},
  timestamp    = {Thu, 10 Jun 2021 13:02:04 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07a,
  author       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  editor       = {David Chaum and
                  Miroslaw Kutylowski and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan},
  title        = {07311 Abstracts Collection -- Frontiers of Electronic Voting},
  booktitle    = {Frontiers of Electronic Voting, 29.07. - 03.08.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07311},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1303},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumGRV07,
  author       = {David Chaum and
                  Jeroen van de Graaf and
                  Peter Y. A. Ryan and
                  Poorvi L. Vora},
  title        = {Secret Ballot Elections with Unconditional Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChaumRS05,
  author       = {David Chaum and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {A Practical Voter-Verifiable Election Scheme},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_8},
  doi          = {10.1007/11555827\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/VoraABCDJJLRSY04,
  author       = {Poorvi L. Vora and
                  Ben Adida and
                  Ren Bucholz and
                  David Chaum and
                  David L. Dill and
                  David R. Jefferson and
                  Douglas W. Jones and
                  William Lattin and
                  Aviel D. Rubin and
                  Michael Ian Shamos and
                  Moti Yung},
  title        = {Evaluation of voting systems},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {11},
  pages        = {144},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029496.1029520},
  doi          = {10.1145/1029496.1029520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Chaum04,
  author       = {David Chaum},
  title        = {Secret-Ballot Receipts: True Voter-Verifiable Elections},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {1},
  pages        = {38--47},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSECP.2004.1264852},
  doi          = {10.1109/MSECP.2004.1264852},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Chaum04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Chaum03,
  author       = {David Chaum},
  editor       = {Dimitris Gritzalis},
  title        = {Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {211--219},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_14},
  doi          = {10.1007/978-1-4615-0239-5\_14},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Chaum03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Chaum97,
  author       = {David Chaum},
  title        = {On Electronic Commerce: How Much Do You Trust Big Brother? (Interview)},
  journal      = {{IEEE} Internet Comput.},
  volume       = {1},
  number       = {6},
  pages        = {8--16},
  year         = {1997},
  url          = {https://doi.org/10.1109/MIC.1997.643931},
  doi          = {10.1109/MIC.1997.643931},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Chaum97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum94,
  author       = {David Chaum},
  editor       = {Alfredo De Santis},
  title        = {Designated Confirmer Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {86--91},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053427},
  doi          = {10.1007/BFB0053427},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrandsC93,
  author       = {Stefan Brands and
                  David Chaum},
  editor       = {Tor Helleseth},
  title        = {Distance-Bounding Protocols (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {344--359},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_30},
  doi          = {10.1007/3-540-48285-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrandsC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BosC92,
  author       = {Jurjen N. Bos and
                  David Chaum},
  editor       = {Ernest F. Brickell},
  title        = {Provably Unforgeable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_1},
  doi          = {10.1007/3-540-48071-4\_1},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BosC92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumP92,
  author       = {David Chaum and
                  Torben P. Pedersen},
  editor       = {Ernest F. Brickell},
  title        = {Wallet Databases with Observers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_7},
  doi          = {10.1007/3-540-48071-4\_7},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumP92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaumP92,
  author       = {David Chaum and
                  Torben P. Pedersen},
  editor       = {Rainer A. Rueppel},
  title        = {Transferred Cash Grows in Size},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {390--407},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_32},
  doi          = {10.1007/3-540-47555-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaumP92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Chaum91,
  author       = {David Chaum},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Numbers Can Be a Better Form of Cash than Paper},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {174--178},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_61},
  doi          = {10.1007/3-540-57341-0\_61},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Chaum91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumHP91,
  author       = {David Chaum and
                  Eug{\`{e}}ne van Heijst and
                  Birgit Pfitzmann},
  editor       = {Joan Feigenbaum},
  title        = {Cryptographically Strong Undeniable Signatures, Unconditionally Secure
                  for the Signer},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {470--484},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_38},
  doi          = {10.1007/3-540-46766-1\_38},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumHP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91,
  author       = {Tatsuaki Okamoto and
                  David Chaum and
                  Kazuo Ohta},
  editor       = {Donald W. Davies},
  title        = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_8},
  doi          = {10.1007/3-540-46416-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaumH91,
  author       = {David Chaum and
                  Eug{\`{e}}ne van Heyst},
  editor       = {Donald W. Davies},
  title        = {Group Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_22},
  doi          = {10.1007/3-540-46416-6\_22},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaumH91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91,
  author       = {Bart Preneel and
                  David Chaum and
                  Walter Fumy and
                  Cees J. A. Jansen and
                  Peter Landrock and
                  Gert Roelofsen},
  editor       = {Donald W. Davies},
  title        = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {547--551},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_52},
  doi          = {10.1007/3-540-46416-6\_52},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum91,
  author       = {David Chaum},
  editor       = {Donald W. Davies},
  title        = {Some Weaknesses of "Weaknesses of Undeniable Signatures"},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {554--556},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_54},
  doi          = {10.1007/3-540-46416-6\_54},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Chaum90,
  author       = {David Chaum},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {Showing Credentials without Identification Transfeering Signatures
                  between Unconditionally Unlinkable Pseudonyms},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {246--264},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030366},
  doi          = {10.1007/BFB0030366},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Chaum90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyarCDP90,
  author       = {Joan Boyar and
                  David Chaum and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Convertible Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_14},
  doi          = {10.1007/3-540-38424-3\_14},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyarCDP90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumR90,
  author       = {David Chaum and
                  Sandra Roijakkers},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Unconditionally Secure Digital Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {206--214},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_15},
  doi          = {10.1007/3-540-38424-3\_15},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum90,
  author       = {David Chaum},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Zero-Knowledge Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {458--464},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_41},
  doi          = {10.1007/3-540-46877-3\_41},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumA89,
  author       = {David Chaum and
                  Hans Van Antwerpen},
  editor       = {Gilles Brassard},
  title        = {Undeniable Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {212--216},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_20},
  doi          = {10.1007/0-387-34805-0\_20},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumA89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum89,
  author       = {David Chaum},
  editor       = {Gilles Brassard},
  title        = {The Spymasters Double-Agent Problem: Multiparty Computations Secure
                  Unconditionally from Minorities and Cryptographically from Majorities},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {591--602},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_52},
  doi          = {10.1007/0-387-34805-0\_52},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/VandewalleCFJLR89,
  author       = {Joos Vandewalle and
                  David Chaum and
                  Walter Fumy and
                  Cees J. A. Jansen and
                  Peter Landrock and
                  Gert Roelofsen},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {A European Call For Cryptographic Algorithms: Ripe; Race Integrity
                  Primitives Evaluation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {267--271},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_28},
  doi          = {10.1007/3-540-46885-4\_28},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/VandewalleCFJLR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum89,
  author       = {David Chaum},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Online Cash Checks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {288--293},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_30},
  doi          = {10.1007/3-540-46885-4\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaumBHMS89,
  author       = {David Chaum and
                  Bert den Boer and
                  Eug{\`{e}}ne van Heyst and
                  Stig Fr. Mj{\o}lsnes and
                  Adri Steenbeek},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Efficient Offline Electronic Checks (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {294--301},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_31},
  doi          = {10.1007/3-540-46885-4\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaumBHMS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/BrassardCC88,
  author       = {Gilles Brassard and
                  David Chaum and
                  Claude Cr{\'{e}}peau},
  title        = {Minimum Disclosure Proofs of Knowledge},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {37},
  number       = {2},
  pages        = {156--189},
  year         = {1988},
  url          = {https://doi.org/10.1016/0022-0000(88)90005-0},
  doi          = {10.1016/0022-0000(88)90005-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/BrassardCC88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Chaum88,
  author       = {David Chaum},
  title        = {The Dining Cryptographers Problem: Unconditional Sender and Recipient
                  Untraceability},
  journal      = {J. Cryptol.},
  volume       = {1},
  number       = {1},
  pages        = {65--75},
  year         = {1988},
  url          = {https://doi.org/10.1007/BF00206326},
  doi          = {10.1007/BF00206326},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Chaum88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumFN88,
  author       = {David Chaum and
                  Amos Fiat and
                  Moni Naor},
  editor       = {Shafi Goldwasser},
  title        = {Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {319--327},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_25},
  doi          = {10.1007/0-387-34799-2\_25},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum88,
  author       = {David Chaum},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Elections with Unconditionally-Secret Ballots and Disruption Equivalent
                  to Breaking {RSA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {177--182},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_15},
  doi          = {10.1007/3-540-45961-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ChaumCD88,
  author       = {David Chaum and
                  Claude Cr{\'{e}}peau and
                  Ivan Damg{\aa}rd},
  editor       = {Janos Simon},
  title        = {Multiparty Unconditionally Secure Protocols (Extended Abstract)},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {11--19},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62214},
  doi          = {10.1145/62212.62214},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ChaumCD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/87,
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-39118-5},
  doi          = {10.1007/3-540-39118-5},
  isbn         = {3-540-19102-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/insk/Chaum87,
  author       = {David Chaum},
  title        = {Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Gro{\ss}en
                  Bruder der Vergangenheit angeh{\"{o}}ren lassen - Zur Diskussion
                  gestellt},
  journal      = {Inform. Spektrum},
  volume       = {10},
  number       = {5},
  pages        = {262--277},
  year         = {1987},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/insk/Chaum87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumDG87,
  author       = {David Chaum and
                  Ivan Damg{\aa}rd and
                  Jeroen van de Graaf},
  editor       = {Carl Pomerance},
  title        = {Multiparty Computations Ensuring Privacy of Each Party's Input and
                  Correctness of the Result},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {87--119},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_7},
  doi          = {10.1007/3-540-48184-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumDG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrickellCDG87,
  author       = {Ernest F. Brickell and
                  David Chaum and
                  Ivan Damg{\aa}rd and
                  Jeroen van de Graaf},
  editor       = {Carl Pomerance},
  title        = {Gradual and Verifiable Release of a Secret},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {156--166},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_11},
  doi          = {10.1007/3-540-48184-2\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrickellCDG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumCD87,
  author       = {David Chaum and
                  Claude Cr{\'{e}}peau and
                  Ivan Damg{\aa}rd},
  editor       = {Carl Pomerance},
  title        = {Multiparty Unconditionally Secure Protocols (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {462},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_43},
  doi          = {10.1007/3-540-48184-2\_43},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumCD87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChaumEG87,
  author       = {David Chaum and
                  Jan{-}Hendrik Evertse and
                  Jeroen van de Graaf},
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {An Improved Protocol for Demonstrating Possession of Discrete Logarithms
                  and Some Generalizations},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-39118-5\_13},
  doi          = {10.1007/3-540-39118-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChaumEG87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum87,
  author       = {David Chaum},
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {Blinding for Unanticipated Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  pages        = {227--233},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-39118-5\_21},
  doi          = {10.1007/3-540-39118-5\_21},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JongeC86,
  author       = {Wiebren de Jonge and
                  David Chaum},
  editor       = {Andrew M. Odlyzko},
  title        = {Some Variations on {RSA} Signatures and Their Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {49--59},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_4},
  doi          = {10.1007/3-540-47721-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JongeC86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumE86,
  author       = {David Chaum and
                  Jan{-}Hendrik Evertse},
  editor       = {Andrew M. Odlyzko},
  title        = {A Secure and Privacy-protecting Protocol for Transmitting Personal
                  Information Between Organizations},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {118--167},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_10},
  doi          = {10.1007/3-540-47721-7\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumE86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum86,
  author       = {David Chaum},
  editor       = {Andrew M. Odlyzko},
  title        = {Demonstrating That a Public Predicate Can Be Satisfied Without Revealing
                  Any Information About How},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {195--199},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_13},
  doi          = {10.1007/3-540-47721-7\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumEGP86,
  author       = {David Chaum and
                  Jan{-}Hendrik Evertse and
                  Jeroen van de Graaf and
                  Ren{\'{e}} Peralta},
  editor       = {Andrew M. Odlyzko},
  title        = {Demonstrating Possession of a Discrete Logarithm Without Revealing
                  It},
  booktitle    = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California,
                  USA, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {263},
  pages        = {200--212},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-47721-7\_14},
  doi          = {10.1007/3-540-47721-7\_14},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumEGP86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Chaum85,
  author       = {David Chaum},
  title        = {Security Without Identification: Transaction Systems to Make Big Brother
                  Obsolete},
  journal      = {Commun. {ACM}},
  volume       = {28},
  number       = {10},
  pages        = {1030--1044},
  year         = {1985},
  url          = {https://doi.org/10.1145/4372.4373},
  doi          = {10.1145/4372.4373},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Chaum85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JongeC85,
  author       = {Wiebren de Jonge and
                  David Chaum},
  editor       = {Hugh C. Williams},
  title        = {Attacks on Some {RSA} Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {18--27},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_3},
  doi          = {10.1007/3-540-39799-X\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JongeC85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumE85,
  author       = {David Chaum and
                  Jan{-}Hendrik Evertse},
  editor       = {Hugh C. Williams},
  title        = {Crytanalysis of {DES} with a Reduced Number of Rounds: Sequences of
                  Linear Factors in Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_16},
  doi          = {10.1007/3-540-39799-X\_16},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumE85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/datenschutz/Chaum85,
  author       = {David Chaum},
  editor       = {Peter Paul Spies},
  title        = {New Secret Codes can Prevent a Computerized Big Brother},
  booktitle    = {Datenschutz und Datensicherung im Wandel der Informationstechnologien,
                  1. GI-Fachtagung, M{\"{u}}nchen, 30. und 31. Oktober 1985, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {113},
  pages        = {33--34},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/978-3-642-70865-7\_3},
  doi          = {10.1007/978-3-642-70865-7\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/datenschutz/Chaum85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Chaum85,
  author       = {David Chaum},
  editor       = {Franz Pichler},
  title        = {Showing Credentials Without Identification: SIgnatures Transferred
                  Between Unconditionally Unlinkable Pseudonyms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Linz, Austria, April 1985,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {219},
  pages        = {241--244},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39805-8\_28},
  doi          = {10.1007/3-540-39805-8\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Chaum85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1984,
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39568-7},
  doi          = {10.1007/3-540-39568-7},
  isbn         = {3-540-15658-5},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum84,
  author       = {David Chaum},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {New Secret Codes Can Prevent a Computerized Big Brother (Abstract)},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {432--433},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_33},
  doi          = {10.1007/3-540-39568-7\_33},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum84a,
  author       = {David Chaum},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding,
                  and Threshold Systems},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {481--485},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_40},
  doi          = {10.1007/3-540-39568-7\_40},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum84a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Chaum84,
  author       = {David Chaum},
  title        = {A New Paradigm for Individuals in the Information Age},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10025},
  doi          = {10.1109/SP.1984.10025},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Chaum84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1983,
  editor       = {David Chaum},
  title        = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara,
                  California, USA, August 21-24, 1983},
  publisher    = {Plenum Press, New York},
  year         = {1984},
  timestamp    = {Tue, 13 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/1983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum83,
  author       = {David Chaum},
  editor       = {David Chaum},
  title        = {Blind Signature System},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara,
                  California, USA, August 21-24, 1983},
  pages        = {153},
  publisher    = {Plenum Press, New York},
  year         = {1983},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum83a,
  author       = {David Chaum},
  editor       = {David Chaum},
  title        = {Design Concepts for Tamper Responding Systems},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara,
                  California, USA, August 21-24, 1983},
  pages        = {387--392},
  publisher    = {Plenum Press, New York},
  year         = {1983},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum83a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1982,
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  publisher    = {Plenum Press, New York},
  year         = {1983},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4},
  doi          = {10.1007/978-1-4757-0602-4},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1982.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum82,
  author       = {David Chaum},
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {Blind Signatures for Untraceable Payments},
  booktitle    = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  pages        = {199--203},
  publisher    = {Plenum Press, New York},
  year         = {1982},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4\_18},
  doi          = {10.1007/978-1-4757-0602-4\_18},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Chaum81,
  author       = {David Chaum},
  title        = {Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms},
  journal      = {Commun. {ACM}},
  volume       = {24},
  number       = {2},
  pages        = {84--88},
  year         = {1981},
  url          = {https://doi.org/10.1145/358549.358563},
  doi          = {10.1145/358549.358563},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Chaum81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Chaum81,
  author       = {David Chaum},
  editor       = {Allen Gersho},
  title        = {Verification by Anonymous Monitors},
  booktitle    = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE}
                  Workshop on Communications Security, Santa Barbara, California, USA,
                  August 24-26, 1981},
  pages        = {138--139},
  publisher    = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report
                  No 82-04},
  year         = {1981},
  timestamp    = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Chaum81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics