Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
David Chaum
2010 – today
- 2013
[c54]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora: Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. ACNS 2013: 441-457
[i2]Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora: Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. IACR Cryptology ePrint Archive 2013: 214 (2013)- 2011
[c53]David Chaum, Alex Florescu, Mridul Nandi, Stefan Popoveniuc, Jan Rubio, Poorvi L. Vora, Filip Zagórski: Paperless Independently-Verifiable Voting. VOTE-ID 2011: 140-157- 2010
[j13]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora: Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Transactions on Information Forensics and Security 5(1): 194 (2010)
[c52]Alan T. Sherman, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Bimal Sinha, Poorvi L. Vora: Scantegrity Mock Election at Takoma Park. Electronic Voting 2010: 45-61
[c51]Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul S. Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald L. Rivest, Emily Shen, Alan T. Sherman, Poorvi L. Vora: Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy. USENIX Security Symposium 2010: 291-306
[c50]Stefan Popoveniuc, Jeremy Clark, Richard Carback, Aleksander Essex, David Chaum: Securing Optical-Scan Voting. Towards Trustworthy Elections 2010: 357-369
[c49]John Kelsey, Andrew Regenscheid, Tal Moran, David Chaum: Attacking Paper-Based E2E Voting Systems. Towards Trustworthy Elections 2010: 370-387
[e6]David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida (Eds.): Towards Trustworthy Elections, New Directions in Electronic Voting. Lecture Notes in Computer Science 6000, Springer 2010, ISBN 978-3-642-12979-7
2000 – 2009
- 2009
[j12]David Chaum, Benjamin Hosp, Stefan Popoveniuc, Poorvi L. Vora: Accessible Voter-Verifiability. Cryptologia 33(3): 283-291 (2009)
[j11]Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora: Guest editorial: special issue on electronic voting. IEEE Transactions on Information Forensics and Security 4(4): 593-596 (2009)
[j10]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora: Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes. IEEE Transactions on Information Forensics and Security 4(4): 611-627 (2009)- 2008
[j9]David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, Poorvi L. Vora: Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting. IEEE Security & Privacy 6(3): 40-46 (2008)
[c48]Meredith L. Patterson, Len Sassaman, David Chaum: Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. UPSEC 2008
[c47]David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman: Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. EVT 2008
[e5]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan (Eds.): Frontiers of Electronic Voting, 29.07. - 03.08.2007. Dagstuhl Seminar Proceedings 07311, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008- 2007
[c46]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Executive Summary -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[c45]David Chaum, Miroslaw Kutylowski, Ronald L. Rivest, Peter Y. A. Ryan: 07311 Abstracts Collection -- Frontiers of Electronic Voting. Frontiers of Electronic Voting 2007
[i1]David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora: Secret Ballot Elections with Unconditional Integrity. IACR Cryptology ePrint Archive 2007: 270 (2007)- 2005
[c44]David Chaum, Peter Y. A. Ryan, Steve A. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005: 118-139- 2004
[j8]Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, Moti Yung: Evaluation of voting systems. Commun. ACM 47(11): 144 (2004)
[j7]David Chaum: Secret-Ballot Receipts: True Voter-Verifiable Elections. IEEE Security & Privacy 2(1): 38-47 (2004)- 2003
[p1]David Chaum: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Secure Electronic Voting 2003: 211-219
1990 – 1999
- 1997
[j6]David Chaum: On Electronic Commerce: How Much Do You Trust Big Brother? (Interview). IEEE Internet Computing 1(6): 8-16 (1997)- 1994
[c43]- 1993
[c42]Stefan Brands, David Chaum: Distance-Bounding Protocols (Extended Abstract). EUROCRYPT 1993: 344-359- 1992
[c41]
[c40]
[c39]- 1991
[c38]David Chaum: Numbers Can Be a Better Form of Cash than Paper. Computer Security and Industrial Cryptography 1991: 174-178
[c37]David Chaum, Eugène van Heijst, Birgit Pfitzmann: Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. CRYPTO 1991: 470-484
[c36]Tatsuaki Okamoto, David Chaum, Kazuo Ohta: Direct Zero Knowledge Proofs of Computational Power in Five Rounds. EUROCRYPT 1991: 96-105
[c35]
[c34]Bart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen: Race Integrity Primitives Evaluation (RIPE): A Status Report. EUROCRYPT 1991: 547-551
[c33]- 1990
[c32]David Chaum: Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. AUSCRYPT 1990: 246-264
[c31]Joan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen: Convertible Undeniable Signatures. CRYPTO 1990: 189-205
[c30]
[c29]
1980 – 1989
- 1989
[c28]
[c27]David Chaum: The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. CRYPTO 1989: 591-602
[c26]Joos Vandewalle, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen: A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. EUROCRYPT 1989: 267-271
[c25]
[c24]David Chaum, Bert den Boer, Eugène van Heyst, Stig Fr. Mjølsnes, Adri Steenbeek: Efficient Offline Electronic Checks (Extended Abstract). EUROCRYPT 1989: 294-301- 1988
[j5]Gilles Brassard, David Chaum, Claude Crépeau: Minimum Disclosure Proofs of Knowledge. J. Comput. Syst. Sci. 37(2): 156-189 (1988)
[j4]David Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. J. Cryptology 1(1): 65-75 (1988)
[c23]
[c22]David Chaum: Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. EUROCRYPT 1988: 177-182
[c21]David Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Extended Abstract). STOC 1988: 11-19
[e4]David Chaum, Wyn L. Price (Eds.): Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings. Lecture Notes in Computer Science 304, Springer 1988, ISBN 3-540-19102-X- 1987
[j3]David Chaum: Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Großen Bruder der Vergangenheit angehören lassen - Zur Diskussion gestellt. Informatik Spektrum 10(5): 262-277 (1987)
[c20]David Chaum, Ivan Damgård, Jeroen van de Graaf: Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. CRYPTO 1987: 87-119
[c19]Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf: Gradual and Verifiable Release of a Secret. CRYPTO 1987: 156-166
[c18]David Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Abstract). CRYPTO 1987: 462
[c17]David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf: An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. EUROCRYPT 1987: 127-141
[c16]- 1986
[c15]Wiebren de Jonge, David Chaum: Some Variations on RSA Signatures and Their Security. CRYPTO 1986: 49-59
[c14]David Chaum, Jan-Hendrik Evertse: A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. CRYPTO 1986: 118-167
[c13]David Chaum: Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How. CRYPTO 1986: 195-199
[c12]David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta: Demonstrating Possession of a Discrete Logarithm Without Revealing It. CRYPTO 1986: 200-212- 1985
[j2]David Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete. Commun. ACM 28(10): 1030-1044 (1985)
[c11]
[c10]David Chaum, Jan-Hendrik Evertse: Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. CRYPTO 1985: 192-211
[c9]David Chaum: New Secret Codes can Prevent a Computerized Big Brother. Datenschutz und Datensicherung 1985: 33-34
[c8]David Chaum: Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. EUROCRYPT 1985: 241-244
[e3]G. R. Blakley, David Chaum (Eds.): Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Lecture Notes in Computer Science 196, Springer 1985, ISBN 3-540-15658-5- 1984
[c7]David Chaum: New Secret Codes Can Prevent a Computerized Big Brother (Abstract). CRYPTO 1984: 432-433
[c6]David Chaum: How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. CRYPTO 1984: 481-485
[c5]David Chaum: A New Paradigm for Individuals in the Information Age. IEEE Symposium on Security and Privacy 1984: 99-106
[e2]David Chaum (Ed.): Advances in Cryptology, Proceedings of CRYPTO '83, Santa Barbara, California, USA, August 21-24, 1983. Plenum Press, New York 1984- 1983
[c4]
[c3]
[e1]David Chaum, Ronald L. Rivest, Alan T. Sherman (Eds.): Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982. Plenum Press, New York 1983- 1982
[c2]- 1981
[j1]David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2): 84-88 (1981)
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:12 CEST by the dblp team



