Breaking an efficient anonymous channel
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 332-340
- https://doi.org/10.1007/bfb0053448
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Immunizing public key cryptosystems against chosen ciphertext attacksIEEE Journal on Selected Areas in Communications, 1993
- Cryptographic defense against traffic analysisPublished by Association for Computing Machinery (ACM) ,1993
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- A robust and verifiable cryptographically secure election schemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981