Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: David Chaum
@article{DBLP:journals/iacr/ChaumCCYA23, author = {David Chaum and Bernardo Cardoso and William Carter and Mario Yaksetig and Baltasar Aroso}, title = {Phoenixx: Linear consensus with random sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1262}, year = {2023}, url = {https://eprint.iacr.org/2023/1262}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumCCYA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChaumYSR22, author = {David Chaum and Mario Yaksetig and Alan T. Sherman and Joeri de Ruiter}, title = {{UDM:} Private user discovery with minimal information disclosure}, journal = {Cryptologia}, volume = {46}, number = {4}, pages = {347--379}, year = {2022}, url = {https://doi.org/10.1080/01611194.2021.1911876}, doi = {10.1080/01611194.2021.1911876}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/ChaumYSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChaumLY22, author = {David Chaum and Mario Larangeira and Mario Yaksetig}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {WOTSwana: {A} Generalized \emph{S}\({}_{\mbox{ leeve }}\) Construction for Multiple Proofs of Ownership}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {491--511}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_24}, doi = {10.1007/978-3-031-29371-9\_24}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChaumLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/ChaumLY22, author = {David Chaum and Mario Larangeira and Mario Yaksetig}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Tweakable S\({}_{\mbox{leeve}}\): {A} Novel S\({}_{\mbox{leeve}}\) Construction Based on Tweakable Hash Functions}, booktitle = {3rd International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2022, Vilamoura, Portugal, July 12-14, 2022}, series = {Lecture Notes in Operations Research}, pages = {169--186}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18679-0\_10}, doi = {10.1007/978-3-031-18679-0\_10}, timestamp = {Tue, 11 Jul 2023 16:47:12 +0200}, biburl = {https://dblp.org/rec/conf/marble/ChaumLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumLY22, author = {David Chaum and Mario Larangeira and Mario Yaksetig}, title = {Tweakable Sleeve: {A} Novel Sleeve Construction based on Tweakable Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2022}, url = {https://eprint.iacr.org/2022/888}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumCCLNPSYYZZ22, author = {David Chaum and Richard Carback and Jeremy Clark and Chao Liu and Mahdi Nejadgholi and Bart Preneel and Alan T. Sherman and Mario Yaksetig and Zeyuan Yin and Filip Zag{\'{o}}rski and Bingsheng Zhang}, title = {VoteXX: {A} Solution to Improper Influence in Voter-Verifiable Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1212}, year = {2022}, url = {https://eprint.iacr.org/2022/1212}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumCCLNPSYYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumLY22a, author = {David Chaum and Mario Larangeira and Mario Yaksetig}, title = {WOTSwana: {A} Generalized Sleeve Construction for Multiple Proofs of Ownership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1623}, year = {2022}, url = {https://eprint.iacr.org/2022/1623}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChaumLY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChaumLYC21, author = {David Chaum and Mario Larangeira and Mario Yaksetig and William Carter}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {W-OTS\({}^{\mbox{+}}\) Up My Sleeve! {A} Hidden Secure Fallback for Cryptocurrency Wallets}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {195--219}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_8}, doi = {10.1007/978-3-030-78372-3\_8}, timestamp = {Wed, 09 Jun 2021 10:50:14 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChaumLYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-00254, author = {David Chaum and Christian Grothoff and Thomas Moser}, title = {How to Issue a Central Bank Digital Currency}, journal = {CoRR}, volume = {abs/2103.00254}, year = {2021}, url = {https://arxiv.org/abs/2103.00254}, eprinttype = {arXiv}, eprint = {2103.00254}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-00254.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumLYC21, author = {David Chaum and Mario Larangeira and Mario Yaksetig and William Carter}, title = {{W-OTS(+)} up my Sleeve! {A} Hidden Secure Fallback for Cryptocurrency Wallets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2021}, url = {https://eprint.iacr.org/2021/872}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumLYC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChaumDJKKRS17, author = {David Chaum and Debajyoti Das and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {557--578}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_28}, doi = {10.1007/978-3-319-61204-1\_28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChaumDJKKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidChaumJKKRS16, author = {David Chaum and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman}, title = {cMix: Anonymization byHigh-Performance Scalable Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2016}, url = {http://eprint.iacr.org/2016/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidChaumJKKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZagorskiCCCEV13, author = {Filip Zag{\'{o}}rski and Richard Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {441--457}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_28}, doi = {10.1007/978-3-642-38980-1\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZagorskiCCCEV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZagorskiCCCEV13, author = {Filip Zag{\'{o}}rski and Richard Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora}, title = {Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2013}, url = {http://eprint.iacr.org/2013/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZagorskiCCCEV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShermanFCC11, author = {Alan T. Sherman and Russell A. Fink and Richard Carback and David Chaum}, editor = {Hovav Shacham and Vanessa Teague}, title = {Scantegrity {III:} Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability}, booktitle = {2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '11, San Francisco, CA, USA, August 8-9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/evtwote-11/scantegrity-iii-automatic-trustworthy-receipts-highlighting-overunder-votes}, timestamp = {Mon, 01 Feb 2021 08:42:50 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShermanFCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/ChaumFNPRVZ11, author = {David Chaum and Alex Florescu and Mridul Nandi and Stefan Popoveniuc and Jan Rubio and Poorvi L. Vora and Filip Zag{\'{o}}rski}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {Paperless Independently-Verifiable Voting}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {140--157}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_9}, doi = {10.1007/978-3-642-32747-6\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/ChaumFNPRVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaumCCEPRRSSV10, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Corrections to scantegrity {II:} end-to-end verifiability by voters of optical scan elections through confirmation codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {1}, pages = {194}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2040672}, doi = {10.1109/TIFS.2010.2040672}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ev/ShermanCCCEHMPRSSV10, author = {Alan T. Sherman and Richard Carback and David Chaum and Jeremy Clark and Aleksander Essex and Paul S. Herrnson and Travis Mayberry and Stefan Popoveniuc and Ronald L. Rivest and Emily Shen and Bimal Sinha and Poorvi L. Vora}, editor = {Robert Krimmer and R{\"{u}}diger Grimm}, title = {Scantegrity Mock Election at Takoma Park}, booktitle = {Electronic Voting 2010, {EVOTE} 2010, 4th International Conference, Co-organized by Council of Europe, Gesellschaft f{\"{u}}r Informatik and E-Voting.CC, July 21st - 24th, 2010, in Castle Hofen, Bregenz, Austria}, series = {{LNI}}, volume = {{P-167}}, pages = {45--61}, publisher = {{GI}}, year = {2010}, url = {https://dl.gi.de/handle/20.500.12116/19503}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ev/ShermanCCCEHMPRSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/CarbackCCCEHMPRSSV10, author = {Richard Carback and David Chaum and Jeremy Clark and John Conway and Aleksander Essex and Paul S. Herrnson and Travis Mayberry and Stefan Popoveniuc and Ronald L. Rivest and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Scantegrity {II} Municipal Election at Takoma Park: The First {E2E} Binding Governmental Election with Ballot Privacy}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {291--306}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Carback.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/CarbackCCCEHMPRSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/PopoveniucCCEC10, author = {Stefan Popoveniuc and Jeremy Clark and Richard Carback and Aleksander Essex and David Chaum}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Securing Optical-Scan Voting}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {357--369}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_22}, doi = {10.1007/978-3-642-12980-3\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/PopoveniucCCEC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/KelseyRMC10, author = {John Kelsey and Andrew Regenscheid and Tal Moran and David Chaum}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Attacking Paper-Based {E2E} Voting Systems}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {370--387}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_23}, doi = {10.1007/978-3-642-12980-3\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wote/KelseyRMC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wote/2010lncs, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3}, doi = {10.1007/978-3-642-12980-3}, isbn = {978-3-642-12979-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wote/2010lncs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChaumHPV09, author = {David Chaum and Benjamin Hosp and Stefan Popoveniuc and Poorvi L. Vora}, title = {Accessible Voter-Verifiability}, journal = {Cryptologia}, volume = {33}, number = {3}, pages = {283--291}, year = {2009}, url = {https://doi.org/10.1080/01611190902894946}, doi = {10.1080/01611190902894946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChaumHPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RivestCPRSV09, author = {Ronald L. Rivest and David Chaum and Bart Preneel and Aviel D. Rubin and Donald G. Saari and Poorvi L. Vora}, title = {Guest editorial: special issue on electronic voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {593--596}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034721}, doi = {10.1109/TIFS.2009.2034721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChaumCCEPRRSSV09, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman and Poorvi L. Vora}, title = {Scantegrity {II:} end-to-end verifiability by voters of optical scan elections through confirmation codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {611--627}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034919}, doi = {10.1109/TIFS.2009.2034919}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChaumCCEPRRSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ChaumECCPSV08, author = {David Chaum and Aleksander Essex and Richard Carback and Jeremy Clark and Stefan Popoveniuc and Alan T. Sherman and Poorvi L. Vora}, title = {Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {3}, pages = {40--46}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.70}, doi = {10.1109/MSP.2008.70}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ChaumECCPSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/PattersonSC08, author = {Meredith L. Patterson and Len Sassaman and David Chaum}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {Freezing More Than Bits: Chilling Effects of the {OLPC} {XO} Security Model}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/patterson/patterson.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/PattersonSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChaumCCEPRRSS08, author = {David Chaum and Richard Carback and Jeremy Clark and Aleksander Essex and Stefan Popoveniuc and Ronald L. Rivest and Peter Y. A. Ryan and Emily Shen and Alan T. Sherman}, editor = {David L. Dill and Tadayoshi Kohno}, title = {Scantegrity {II:} End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes}, booktitle = {2008 {USENIX/ACCURATE} Electronic Voting Workshop, {EVT} 2008, July 28-29, 2008, San Jose, CA, USA, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/evt08/tech/full\_papers/chaum/chaum.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChaumCCEPRRSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7311, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07311/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07, author = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {07311 Executive Summary -- Frontiers of Electronic Voting}, booktitle = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1294}, timestamp = {Thu, 10 Jun 2021 13:02:04 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ChaumKRR07a, author = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, editor = {David Chaum and Miroslaw Kutylowski and Ronald L. Rivest and Peter Y. A. Ryan}, title = {07311 Abstracts Collection -- Frontiers of Electronic Voting}, booktitle = {Frontiers of Electronic Voting, 29.07. - 03.08.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07311}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1303}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/ChaumKRR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumGRV07, author = {David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora}, title = {Secret Ballot Elections with Unconditional Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2007}, url = {http://eprint.iacr.org/2007/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChaumRS05, author = {David Chaum and Peter Y. A. Ryan and Steve A. Schneider}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {A Practical Voter-Verifiable Election Scheme}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {118--139}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_8}, doi = {10.1007/11555827\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChaumRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/VoraABCDJJLRSY04, author = {Poorvi L. Vora and Ben Adida and Ren Bucholz and David Chaum and David L. Dill and David R. Jefferson and Douglas W. Jones and William Lattin and Aviel D. Rubin and Michael Ian Shamos and Moti Yung}, title = {Evaluation of voting systems}, journal = {Commun. {ACM}}, volume = {47}, number = {11}, pages = {144}, year = {2004}, url = {https://doi.org/10.1145/1029496.1029520}, doi = {10.1145/1029496.1029520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/VoraABCDJJLRSY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Chaum04, author = {David Chaum}, title = {Secret-Ballot Receipts: True Voter-Verifiable Elections}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {1}, pages = {38--47}, year = {2004}, url = {https://doi.org/10.1109/MSECP.2004.1264852}, doi = {10.1109/MSECP.2004.1264852}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Chaum04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Chaum03, author = {David Chaum}, editor = {Dimitris Gritzalis}, title = {Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {211--219}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_14}, doi = {10.1007/978-1-4615-0239-5\_14}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Chaum03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Chaum97, author = {David Chaum}, title = {On Electronic Commerce: How Much Do You Trust Big Brother? (Interview)}, journal = {{IEEE} Internet Comput.}, volume = {1}, number = {6}, pages = {8--16}, year = {1997}, url = {https://doi.org/10.1109/MIC.1997.643931}, doi = {10.1109/MIC.1997.643931}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Chaum97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum94, author = {David Chaum}, editor = {Alfredo De Santis}, title = {Designated Confirmer Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {86--91}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053427}, doi = {10.1007/BFB0053427}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrandsC93, author = {Stefan Brands and David Chaum}, editor = {Tor Helleseth}, title = {Distance-Bounding Protocols (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {344--359}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_30}, doi = {10.1007/3-540-48285-7\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrandsC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BosC92, author = {Jurjen N. Bos and David Chaum}, editor = {Ernest F. Brickell}, title = {Provably Unforgeable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {1--14}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_1}, doi = {10.1007/3-540-48071-4\_1}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BosC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumP92, author = {David Chaum and Torben P. Pedersen}, editor = {Ernest F. Brickell}, title = {Wallet Databases with Observers}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {89--105}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_7}, doi = {10.1007/3-540-48071-4\_7}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaumP92, author = {David Chaum and Torben P. Pedersen}, editor = {Rainer A. Rueppel}, title = {Transferred Cash Grows in Size}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {390--407}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_32}, doi = {10.1007/3-540-47555-9\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaumP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Chaum91, author = {David Chaum}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Numbers Can Be a Better Form of Cash than Paper}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {174--178}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_61}, doi = {10.1007/3-540-57341-0\_61}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Chaum91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumHP91, author = {David Chaum and Eug{\`{e}}ne van Heijst and Birgit Pfitzmann}, editor = {Joan Feigenbaum}, title = {Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {470--484}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_38}, doi = {10.1007/3-540-46766-1\_38}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumHP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91, author = {Tatsuaki Okamoto and David Chaum and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {96--105}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_8}, doi = {10.1007/3-540-46416-6\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaumH91, author = {David Chaum and Eug{\`{e}}ne van Heyst}, editor = {Donald W. Davies}, title = {Group Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {257--265}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_22}, doi = {10.1007/3-540-46416-6\_22}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaumH91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91, author = {Bart Preneel and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Donald W. Davies}, title = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {547--551}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_52}, doi = {10.1007/3-540-46416-6\_52}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum91, author = {David Chaum}, editor = {Donald W. Davies}, title = {Some Weaknesses of "Weaknesses of Undeniable Signatures"}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {554--556}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_54}, doi = {10.1007/3-540-46416-6\_54}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Chaum90, author = {David Chaum}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {246--264}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030366}, doi = {10.1007/BFB0030366}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Chaum90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyarCDP90, author = {Joan Boyar and David Chaum and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Convertible Undeniable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {189--205}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_14}, doi = {10.1007/3-540-38424-3\_14}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyarCDP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumR90, author = {David Chaum and Sandra Roijakkers}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Unconditionally Secure Digital Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {206--214}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_15}, doi = {10.1007/3-540-38424-3\_15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum90, author = {David Chaum}, editor = {Ivan Damg{\aa}rd}, title = {Zero-Knowledge Undeniable Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {458--464}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_41}, doi = {10.1007/3-540-46877-3\_41}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumA89, author = {David Chaum and Hans Van Antwerpen}, editor = {Gilles Brassard}, title = {Undeniable Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {212--216}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_20}, doi = {10.1007/0-387-34805-0\_20}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumA89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum89, author = {David Chaum}, editor = {Gilles Brassard}, title = {The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {591--602}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_52}, doi = {10.1007/0-387-34805-0\_52}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chaum89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/VandewalleCFJLR89, author = {Joos Vandewalle and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {267--271}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_28}, doi = {10.1007/3-540-46885-4\_28}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/VandewalleCFJLR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum89, author = {David Chaum}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Online Cash Checks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {288--293}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_30}, doi = {10.1007/3-540-46885-4\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaumBHMS89, author = {David Chaum and Bert den Boer and Eug{\`{e}}ne van Heyst and Stig Fr. Mj{\o}lsnes and Adri Steenbeek}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Efficient Offline Electronic Checks (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {294--301}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_31}, doi = {10.1007/3-540-46885-4\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaumBHMS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/BrassardCC88, author = {Gilles Brassard and David Chaum and Claude Cr{\'{e}}peau}, title = {Minimum Disclosure Proofs of Knowledge}, journal = {J. Comput. Syst. Sci.}, volume = {37}, number = {2}, pages = {156--189}, year = {1988}, url = {https://doi.org/10.1016/0022-0000(88)90005-0}, doi = {10.1016/0022-0000(88)90005-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/BrassardCC88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Chaum88, author = {David Chaum}, title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability}, journal = {J. Cryptol.}, volume = {1}, number = {1}, pages = {65--75}, year = {1988}, url = {https://doi.org/10.1007/BF00206326}, doi = {10.1007/BF00206326}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Chaum88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumFN88, author = {David Chaum and Amos Fiat and Moni Naor}, editor = {Shafi Goldwasser}, title = {Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {319--327}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_25}, doi = {10.1007/0-387-34799-2\_25}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum88, author = {David Chaum}, editor = {Christoph G. G{\"{u}}nther}, title = {Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking {RSA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {177--182}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_15}, doi = {10.1007/3-540-45961-8\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChaumCD88, author = {David Chaum and Claude Cr{\'{e}}peau and Ivan Damg{\aa}rd}, editor = {Janos Simon}, title = {Multiparty Unconditionally Secure Protocols (Extended Abstract)}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {11--19}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62214}, doi = {10.1145/62212.62214}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChaumCD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/87, editor = {David Chaum and Wyn L. Price}, title = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-39118-5}, doi = {10.1007/3-540-39118-5}, isbn = {3-540-19102-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/insk/Chaum87, author = {David Chaum}, title = {Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Gro{\ss}en Bruder der Vergangenheit angeh{\"{o}}ren lassen - Zur Diskussion gestellt}, journal = {Inform. Spektrum}, volume = {10}, number = {5}, pages = {262--277}, year = {1987}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/insk/Chaum87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumDG87, author = {David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {87--119}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_7}, doi = {10.1007/3-540-48184-2\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrickellCDG87, author = {Ernest F. Brickell and David Chaum and Ivan Damg{\aa}rd and Jeroen van de Graaf}, editor = {Carl Pomerance}, title = {Gradual and Verifiable Release of a Secret}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {156--166}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_11}, doi = {10.1007/3-540-48184-2\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrickellCDG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumCD87, author = {David Chaum and Claude Cr{\'{e}}peau and Ivan Damg{\aa}rd}, editor = {Carl Pomerance}, title = {Multiparty Unconditionally Secure Protocols (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {462}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_43}, doi = {10.1007/3-540-48184-2\_43}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumCD87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChaumEG87, author = {David Chaum and Jan{-}Hendrik Evertse and Jeroen van de Graaf}, editor = {David Chaum and Wyn L. Price}, title = {An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations}, booktitle = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, pages = {127--141}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-39118-5\_13}, doi = {10.1007/3-540-39118-5\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChaumEG87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum87, author = {David Chaum}, editor = {David Chaum and Wyn L. Price}, title = {Blinding for Unanticipated Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, pages = {227--233}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-39118-5\_21}, doi = {10.1007/3-540-39118-5\_21}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JongeC86, author = {Wiebren de Jonge and David Chaum}, editor = {Andrew M. Odlyzko}, title = {Some Variations on {RSA} Signatures and Their Security}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {49--59}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_4}, doi = {10.1007/3-540-47721-7\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JongeC86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumE86, author = {David Chaum and Jan{-}Hendrik Evertse}, editor = {Andrew M. Odlyzko}, title = {A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {118--167}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_10}, doi = {10.1007/3-540-47721-7\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumE86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum86, author = {David Chaum}, editor = {Andrew M. Odlyzko}, title = {Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {195--199}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_13}, doi = {10.1007/3-540-47721-7\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chaum86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumEGP86, author = {David Chaum and Jan{-}Hendrik Evertse and Jeroen van de Graaf and Ren{\'{e}} Peralta}, editor = {Andrew M. Odlyzko}, title = {Demonstrating Possession of a Discrete Logarithm Without Revealing It}, booktitle = {Advances in Cryptology - {CRYPTO} '86, Santa Barbara, California, USA, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {263}, pages = {200--212}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-47721-7\_14}, doi = {10.1007/3-540-47721-7\_14}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChaumEGP86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Chaum85, author = {David Chaum}, title = {Security Without Identification: Transaction Systems to Make Big Brother Obsolete}, journal = {Commun. {ACM}}, volume = {28}, number = {10}, pages = {1030--1044}, year = {1985}, url = {https://doi.org/10.1145/4372.4373}, doi = {10.1145/4372.4373}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Chaum85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JongeC85, author = {Wiebren de Jonge and David Chaum}, editor = {Hugh C. Williams}, title = {Attacks on Some {RSA} Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {18--27}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_3}, doi = {10.1007/3-540-39799-X\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JongeC85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumE85, author = {David Chaum and Jan{-}Hendrik Evertse}, editor = {Hugh C. Williams}, title = {Crytanalysis of {DES} with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {192--211}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_16}, doi = {10.1007/3-540-39799-X\_16}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumE85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/datenschutz/Chaum85, author = {David Chaum}, editor = {Peter Paul Spies}, title = {New Secret Codes can Prevent a Computerized Big Brother}, booktitle = {Datenschutz und Datensicherung im Wandel der Informationstechnologien, 1. GI-Fachtagung, M{\"{u}}nchen, 30. und 31. Oktober 1985, Proceedings}, series = {Informatik-Fachberichte}, volume = {113}, pages = {33--34}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/978-3-642-70865-7\_3}, doi = {10.1007/978-3-642-70865-7\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/datenschutz/Chaum85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Chaum85, author = {David Chaum}, editor = {Franz Pichler}, title = {Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms}, booktitle = {Advances in Cryptology - {EUROCRYPT} '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {219}, pages = {241--244}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39805-8\_28}, doi = {10.1007/3-540-39805-8\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Chaum85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1984, editor = {G. R. Blakley and David Chaum}, title = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39568-7}, doi = {10.1007/3-540-39568-7}, isbn = {3-540-15658-5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum84, author = {David Chaum}, editor = {G. R. Blakley and David Chaum}, title = {New Secret Codes Can Prevent a Computerized Big Brother (Abstract)}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {432--433}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_33}, doi = {10.1007/3-540-39568-7\_33}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chaum84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum84a, author = {David Chaum}, editor = {G. R. Blakley and David Chaum}, title = {How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {481--485}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_40}, doi = {10.1007/3-540-39568-7\_40}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Chaum84a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Chaum84, author = {David Chaum}, title = {A New Paradigm for Individuals in the Information Age}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10025}, doi = {10.1109/SP.1984.10025}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Chaum84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1983, editor = {David Chaum}, title = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara, California, USA, August 21-24, 1983}, publisher = {Plenum Press, New York}, year = {1984}, timestamp = {Tue, 13 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/1983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum83, author = {David Chaum}, editor = {David Chaum}, title = {Blind Signature System}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara, California, USA, August 21-24, 1983}, pages = {153}, publisher = {Plenum Press, New York}, year = {1983}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Chaum83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum83a, author = {David Chaum}, editor = {David Chaum}, title = {Design Concepts for Tamper Responding Systems}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '83, Santa Barbara, California, USA, August 21-24, 1983}, pages = {387--392}, publisher = {Plenum Press, New York}, year = {1983}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Chaum83a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1982, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, publisher = {Plenum Press, New York}, year = {1983}, url = {https://doi.org/10.1007/978-1-4757-0602-4}, doi = {10.1007/978-1-4757-0602-4}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1982.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum82, author = {David Chaum}, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {Blind Signatures for Untraceable Payments}, booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, pages = {199--203}, publisher = {Plenum Press, New York}, year = {1982}, url = {https://doi.org/10.1007/978-1-4757-0602-4\_18}, doi = {10.1007/978-1-4757-0602-4\_18}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Chaum82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Chaum81, author = {David Chaum}, title = {Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {84--88}, year = {1981}, url = {https://doi.org/10.1145/358549.358563}, doi = {10.1145/358549.358563}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Chaum81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Chaum81, author = {David Chaum}, editor = {Allen Gersho}, title = {Verification by Anonymous Monitors}, booktitle = {Advances in Cryptology: {A} Report on {CRYPTO} 81, {CRYPTO} 81, {IEEE} Workshop on Communications Security, Santa Barbara, California, USA, August 24-26, 1981}, pages = {138--139}, publisher = {U. C. Santa Barbara, Dept. of Elec. and Computer Eng., {ECE} Report No 82-04}, year = {1981}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Chaum81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.