
@InProceedings{shuffle,
  author = 	 {C. Andrew Neff},
  title = 	 {A Verifiable Secret Shuffle and its Application to E-Voting},
  booktitle = 	 {8th ACM Conference on Computer and Communications
                  Security (CCS-8)},
  pages =	 {116--125},
  year =	 2001,
  editor =	 {P. Samarati},
  month =	 {November},
  publisher =	 {ACM Press}
}

@InProceedings{dolev91,
  author =       {Danny Dolev and Cynthia Dwork and Moni Naor},
  title =        {Non-Malleable Cryptography},
  booktitle =    {23rd ACM Symposium on the Theory of Computing (STOC)},
  pages =        {542--552},
  year =         1991,
  note =         {Full version available from the authors.}
}


@TechReport{dwork95,
  author = 	 {Cynthia Dwork and Moni Naor},
  title = 	 {Pricing via Processing or Combatting Junk Mail},
  institution =  {Weizmann Institute},
  year = 	 1995,
  number =	 {CS95-20},
  note =	 {A preliminary version appeared in \emph{Crypto '92},
                  pp.\ 129--147}
}

@TechReport{rsw96,
  author =       {Ronald L. Rivest and Adi Shamir and David A. Wagner},
  title =        {Time-lock puzzles and timed-release Crypto},
  year =         1996,
  type =         {MIT LCS technical memo},
  number =       {MIT/LCS/TR-684},
  month =        {February}
}


@InProceedings{web-mix,
   author = {Oliver Berthold and Hannes Federrath and Stefan K\"opsell},
   title = {Web {MIX}es: A system for anonymous and unobservable
                  {I}nternet access}, 
   booktitle = {Designing Privacy Enhancing Technologies, {LNCS} Vol. 2009},
   pages = {115 -- 129},
   year = 2000,
   publisher = {Springer-Verlag}
}

@InProceedings{disad-free-routes,
   author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
   title = {The disadvantages of free {MIX} routes and how to overcome
                  them}, 
   booktitle = {Designing Privacy Enhancing Technologies, {LNCS} Vol. 2009},
   pages = {30 -- 45},
   year = 2000,
   publisher = {Springer-Verlag}
}

@InProceedings{boneh00,
  author =       {Dan Boneh and Moni Naor},
  title =        {Timed Commitments},
  booktitle =    {Advances in Cryptology -- {CRYPTO} 2000, {LNCS}
                  Vol. 1880},
  pages =        {236--254},
  year =         2000,
  publisher =    {Springer-Verlag}
}

@InProceedings{goldschlag98,
  author =       {David M. Goldschlag and Stuart G. Stubblebine},
  title =        {Publicly Verifiable Lotteries: Applications of
                  Delaying Functions},
  booktitle =    {Financial Cryptography, FC'98, {LNCS} Vol. 1465},
  pages =        {214--226},
  year =         1998,
  publisher =    {Springer-Verlag}
}

@InProceedings{syverson98,
  author =       {Paul Syverson},
  title =        {Weakly Secret Bit Commitment: Applications to
                  Lotteries and Fair Exchange},
  booktitle =    {Computer Security Foundations Workshop (CSFW11)},
  pages =        {2--13},
  year =         1998,
  address =      {Rockport Massachusetts},
  month =        {June},
  publisher =    {IEEE CS Press}
}

@Misc{goldschlag-etal,
  author =       {David M. Goldschlag and Stuart G. Stubblebine and
                  Paul F. Syverson},
  title =        {Temporarily Hidden Bit Commitment and Lottery
                  Applications},
  note =         {Submitted for journal publication.}
}

@ARTICLE{chaum-dc,
   author = {David Chaum},
   title = {The {D}ining {C}ryptographers {P}roblem: Unconditional Sender and
     Recipient Untraceability},
   journal = {Journal of Cryptology},
   year = {1988},
   volume = {1},
   pages = {65-75},
}

@misc{mccoy-dcnets,
   author={Jim McCoy},
   title={Re: {DC}-net implementation via reputation capital},
   howpublished = {$<$http://www.privacy.nb.ca/cryptography/archives/coderpunks/new/1998-10/0114.html$>$},
}

@misc{nymip,
   author={John Bashinski et al},
   title={The {NymIP} Effort},
   howpublished = {$<$http://nymip.velvet.com/$>$},
}

@misc{shoup-oaep,
   author={V. Shoup},
   title={{OAEP} Reconsidered},
   howpublished = {{IACR} e-print 2000/060,
     $<$http://eprint.iacr.org/2000/060/$>$},
}

@misc{oaep-plus,
   author={E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
   title={{RSA}-{OAEP} is Still Alive!},
   howpublished = {{IACR} e-print 2000/061,
     $<$http://eprint.iacr.org/2000/061/$>$},
}

@misc{levien,
   author={Tim May},
   title={Description of {L}evien's pinging service},
   howpublished = {\newline
     $<$http://www2.pro-ns.net/$\tilde{\hspace{5pt}}$crypto/chapter8.html$>$},
}

@MISC{mixmaster,
   key = {Mixmaster},
   author = {Electronic {F}rontiers {G}eorgia ({EFGA})},
   title = {Anonymous Remailer Information},
   howpublished = {\newline
     $<$http://anon.efga.org/Remailers/$>$},
}

@ARTICLE{mitzenm-loss,
   author = {G. Louth and M. Mitzenmacher and F.P. Kelly},
   title = {Computational Complexity of Loss Networks},
   journal = {Theoretical Computer Science},
   year = {1994},
   volume = {125},
   pages = {45-59},
}

@misc{hashcash,
   title={Hash cash},
   howpublished = {
     $<$http://www.cypherspace.org/$\tilde{\hspace{5pt}}$adam/hashcash/$>$},
   author = {Adam Back},
}

@InProceedings{oreilly-acc,
   author={Roger Dingledine and Michael J. Freedman and David Molnar},
   title={Accountability},
   booktitle = {Peer-to-peer: Harnessing the Benefits of a Disruptive 
     Technology},
   year = {2001},
   publisher = {O'Reilly and Associates},
}

@InProceedings{han,
   author={Yongfei Han},
   title={Investigation of non-repudiation protocols},
   booktitle = {ACISP 96},
   year = {1996},
   publisher = {Springer-Verlag},
}

@InProceedings{abe,
   author={Masayuki Abe},
   title={Universally Verifiable {MIX} With Verification Work Independent of
     The Number of {MIX} Servers},
   booktitle = {Advances in Cryptology - {EUROCRYPT} 1998, {LNCS} Vol. 1403},
   year = {1998},
   publisher = {Springer-Verlag}, 
}

@InProceedings{desmedt,
   author={Yvo Desmedt and Kaoru Kurosawa},
   title={How To Break a Practical {MIX} and Design a New One},
   booktitle = { Advances in Cryptology - {EUROCRYPT} 2000, {LNCS} Vol. 1803},
   year = {2000},
   publisher = {Springer-Verlag},
}

@InProceedings{mitkuro,
   author={M. Mitomo and K. Kurosawa},
   title={Attack for {F}lash {MIX}},
   booktitle = {Advances in Cryptology -\newline {ASIACRYPT} 2000,
                  {LNCS} Vol. 1976},
   year = {2000},
   publisher = {Springer-Verlag},
}

@InProceedings{hybrid-mix,
   author={M. Ohkubo and M. Abe},
   title={A {L}ength-{I}nvariant {H}ybrid {MIX}},
   booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, {LNCS} Vol. 1976},
   year = {2000},
   publisher = {Springer-Verlag},
}

@InProceedings{kesdogan,
   author={D. Kesdogan and M. Egner and T. B\"uschkes},
   title={Stop-and-Go {MIXes} Providing Probabilistic Anonymity in an Open 
     System},
   booktitle = {Information Hiding Workshop 1998, {LNCS} Vol. 1525},
   year = {1998},
   publisher = {Springer Verlag},
}


@InProceedings{flash-mix,
   author={Markus Jakobsson},
   title={Flash {M}ixing},
   booktitle = {Principles of Distributed Computing - {PODC} '99},
   year = {1999},
   publisher = {ACM},
}


@InProceedings{breadpudding,
  author = 	 {Markus Jakobsson and Ari Juels},
  title = 	 {Proofs of Work and Bread Pudding Protocols},
  booktitle = 	 {Proceedings of the IFIP TC6 and TC11 Joint Working
                  Conference on Communications and Multimedia Security
                  (CMS '99)},
  year =	 1999,
  month =	 {September},
  publisher =	 {Kluwer}
}

@InProceedings{SK,
   author={Joe Kilian and Kazue Sako},
   year ={1995},
   booktitle = {EUROCRYPT '95},
   title = {Receipt-Free Mix-Type Voting Scheme - A Practical Solution to 
     the Implementation of a Voting Booth},
   publisher = {Springer-Verlag},
}

@InProceedings{OAEP,
   author={M. Bellare and P. Rogaway},
   year ={1994},
   booktitle = {EUROCRYPT '94},
   title = {Optimal {A}symmetric {E}ncryption {P}adding : How To Encrypt With
     {RSA}},
   publisher = {Springer-Verlag},
}


@InProceedings{babel,
   author={C. Gulcu and G. Tsudik},
   title={Mixing {E}-mail With {B}abel},
   booktitle = {Network and Distributed Security Symposium - {NDSS} '96},
   year = {1996},
   publisher = {IEEE},
}
   note = {\newline
     $<$http://cob.isu.edu/sndss/sndss96.html$>$}

@misc{freenet,
   title = {Freenet: A Distributed Anonymous Information Storage and Retrieval 
     System},
   howpublished = {$<$http://freenet.sourceforge.net/$>$},
   author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong},
}

@misc{dodis,
   title = {Semantically Secure Homomorphic Encryption Schemes},
   howpublished = {manuscript},
   author = {Yevgeniy Dodis},
}

@misc{rprocess,
   title = {Selective Denial of Service Attacks},
   howpublished = {\newline
     $<$http://www.eff.org/pub/Privacy/Anonymity/1999\_09\_DoS\_remail\_vuln.html$>$},
   author = {RProcess},
}

@misc{remailer-history,
   title = {Description of early remailer history},
   howpublished = {E-mail archived at $<$http://\newline
     www.inet-one.com/cypherpunks/dir.1996.08.29-1996.09.04/msg00431.html$>$},
   author = {Tim May},
}

@misc{freehaven,
   title = {Free {H}aven: A Distributed Anonymous Storage Service},
   howpublished = {$<$http://freehaven.net/$>$},
   author = {Roger Dingledine and Michael J. Freedman and David Molnar},
}

@ARTICLE{chaum-mix,
   author = {David Chaum},
   title = {Untraceable electronic mail, return addresses, and digital pseudo-nyms},
   journal = {Communications of the ACM},
   year = {1982},
   volume = {4},
   number = {2},
   month = {February},
}

@misc{timmay, 
   title = {Cyphernomicon},
   howpublished = {\newline
     $<$http://www2.pro-ns.net/$\tilde{\hspace{5pt}}$crypto/cyphernomicon.html$>$},
   author = {Tim May},
}

@misc{neochaum, 
   title = {Payment mixes for anonymity}, 
   howpublished = {E-mail archived at 
     $<$http://www.inet-one.com/cypherpunks/dir.2000.02.28-2000.03.05/msg00334.html$>$},
   author = {Tim May},
}


@misc{pidaho, 
   title = {{P}rivate {I}daho},
   howpublished = {$<$http://www.eskimo.com/$\tilde{\hspace{5pt}}$joelm/pi.html$>$},
   author = {Joel McNamara},
}

@misc{potato, 
   title = {{P}otato {S}oftware}, 
   howpublished = {$<$http://www.skuz.net/potatoware/$>$},
   author = {RProcess},
}

@misc{helsingius, 
   title = {{\tt anon.penet.fi} press release}, 
   howpublished = {\newline
     $<$http://www.penet.fi/press-english.html$>$},
   author = {J. Helsingius},
}

@misc{mlist2,
   title = {Mixmaster Stats ({A}ustria)}, 
   howpublished = {
     $<$http://www.tahina.priv.at/$\tilde{\hspace{5pt}}$cm/stats/mlist2.html$>$},
   author = {Christian Mock},
}

@misc{garay97secure,
   author = {J. Garay and R. Gennaro and C. Jutla and T. Rabin},
   title = {Secure distributed storage and retrieval},
   text = {J. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed
     storage and retrieval. In 11th
     International Workshop, WDAG '97, pages 275-- 289, Berlin, 1997.
     Springer-Verlag. LNCS Vol. 1320.},
   year = {1997},
}

@misc{PIK,
   author = {C. Park and K. Itoh and K. Kurosawa},
   title = {Efficient anonymous channel and all/nothing election scheme},
   text = {C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and
     all/nothing election scheme. In EuroCrypt'93, 248--259. Springer-Verlag.
     LNCS Vol. 765.},
}

@misc{pgpfaq,
   title = {{PGP} {FAQ}},
   howpublished = {http://www.faqs.org/faqs/pgp-faq/},
   key = {{PGP}},
}

@ARTICLE{riordan-schneier,
   author = {James Riordan and Bruce Schneier},
   title = {A Certified E-mail Protocol with No Trusted Third Party},
   journal = {13th Annual Computer Security Applications Conference},
   month = {December},
   year = {1998},
}

@ARTICLE{crowds,
   author = {Michael K. Reiter and Aviel D. Rubin},
   title = {Crowds: Anonymity for Web Transactions},
   journal = {DIMACS Technical Report},
   volume = {97},
   number = {15},
   month = {April},
   year = {1997},
}

@MISC{hopwood,
   author = {David Hopwood}, 
   title = {Definition of Recipient-Hiding Cryptosystem},
   howpublished = {sci.crypt Usenet post},
}

@MISC{freedom2,
   author = {Zero Knowledge Systems}, 
   title = {Freedom Version 2 White Papers},
   howpublished = {\newline $<$http://www.freedom.net/info/whitepapers/$>$},
}


@MISC{recovery,
   author = {Miguel Castro and Barbara Liskov}, 
   title = {Proactive Recovery in a Byzantine-Fault-Tolerant System},
   howpublished = {
     $<$http://www.pmg.lcs.mit.edu/$\tilde{\hspace{5pt}}$castro/application/recovery.pdf$>$},
}

@MISC{advogato,
   author = {Raph Levien}, 
   title = {Advogato's Trust Metric},
   howpublished = {\newline
     $<$http://www.advogato.org/trust-metric.html$>$},
}

@MISC{rabin-ida,
   author = {Michael O. Rabin},
   title = {Efficient Dispersal of Information for security, load balancing,
     and fault tolerance },
   booktitle = {Journal of the ACM},
   year = {1989},
   volume = {36},
   number = {2},
   series = {335-348},
   month = {April},
}

@PHDTHESIS{MALKIN-THESIS,
   author = {Tal Malkin},
   school = {{MIT}},
   title = {Private Information Retrieval},
   year = {2000},
   note = {see $<$http://www.toc.lcs.mit.edu/$\tilde{\hspace{5pt}}$tal/$>$}
}

@MISC{zks,
   title = {Zero {K}nowledge {S}ystems},
   howpublished = {$<$http://www.freedom.net/$>$},
}  

@misc{publius,
   title = {Publius: A robust, tamper-evident, censorship-resistant and
     source-anonymous web publishing system},
   author = {Marc Waldman and Aviel Rubin and Lorrie Cranor}, 
}

@MISC{freedom-nyms,
   author = {Russell Samuels},
   title = {Untraceable Nym Creation on the {F}reedom {N}etwork},
   year = {1999},
   month = {November},
   day = {21},
}

@ARTICLE{raghavan87randomized,
   author = {P. Raghavan and C. Thompson},
   title = {Randomized rounding},
   journal = {Combinatorica},
   volume = {7},
   pages = {365-374},
   year = {1987}
}

@inproceedings{leighton91fast,
   author = {Frank Thomson Leighton and Fillia Makedon and Serge A. Plotkin and
     Clifford Stein and Eva Tardos and Spyros Tragoudas},
   title = {Fast Approximation Algorithms for Multicommodity Flow Problems},
   booktitle = {{ACM} Symposium on Theory of Computing},
   pages = {101-111},
   year = {1991}
}

@misc{pk-relations,
   author = {M. Bellare and A. Desai and D. Pointcheval and P. Rogaway},
   title = {Relations Among Notions of Security for Public-Key Encryption
     Schemes},
   howpublished = {
     Extended abstract in {\em Advances in Cryptology - CRYPTO '98}, LNCS Vol. 1462.
     Springer-Verlag, 1998.
     Full version available from \newline $<$http://www-cse.ucsd.edu/users/mihir/$>$},
}

@misc{mix-acc,
   author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar},
   title = {A {R}eputation {S}ystem to {I}ncrease {MIX}-net {R}eliability},
   howpublished = {
     Proceedings of the Information Hiding Workshop 2001.
     Also available from $<$http://www.freehaven.net/papers.html$>$},
}

@inproceedings{zhou96certified,
    author = "Zhou and Gollmann",
    title = "Certified Electronic Mail",
    booktitle = "{ESORICS}: European Symposium on Research in Computer
                  Security, {LNCS} Vol. 1146", 
    publisher = "Springer-Verlag",
    year = "1996",
    url = "citeseer.nj.nec.com/zhou96certified.html"
}

@misc{realtime-mix,
  author = {Anja Jerichow and Jan M\"uller and Andreas Pfitzmann and
                  Birgit Pfitzmann and Michael Waidner}, 
  title = {Real-{T}ime {M}ixes: A Bandwidth-Efficient Anonymity Protocol},
  howpublished = 
    {IEEE Journal on Selected Areas in Communications 1998.},
}

