aboutsummaryrefslogtreecommitdiff
path: root/ngi-crypto/extra.bib
diff options
context:
space:
mode:
Diffstat (limited to 'ngi-crypto/extra.bib')
-rw-r--r--ngi-crypto/extra.bib294
1 files changed, 294 insertions, 0 deletions
diff --git a/ngi-crypto/extra.bib b/ngi-crypto/extra.bib
new file mode 100644
index 0000000..48d1433
--- /dev/null
+++ b/ngi-crypto/extra.bib
@@ -0,0 +1,294 @@
+
+@techreport{project-hamilton-boston-fed,
+ author = {{Jim Cunha, Robert Bench, James Lovejoy, Cory Fields, Madars Virza, Tyler Frederick, David Urness, Kevin Karwaski, Anders Brownworth, Neha Narula}},
+ institution = {Federal Reserve Bank of Boston and Massachusetts Institute of Technology Digital Currency Initiative},
+ title = {Project Hamilton Phase 1 A High Performance Payment Processing System Designed for Central Bank Digital Currencies},
+ month = {Feb},
+ year = {2022},
+ note = {Available at \url{https://www.bostonfed.org/-/media/Documents/Project-Hamilton/Project-Hamilton-Phase-1-Whitepaper.pdf} [05.05.2022]}
+}
+
+@techreport{riskbank-e-krona-phase-2,
+ author = {Sveriges Riskbank},
+ institution = {Sveriges Riskbank},
+ title = {e-krona pilot Phase 2},
+ note = {Available at \url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2022/e-krona-pilot-phase-2.pdf} [05.05.2022]},
+ year = {2022},
+ month = {Apr},
+}
+
+@techreport{pboc-e-cny,
+ author = {People's Bank of China},
+ institution = {People's Bank of China},
+ month = {Jul},
+ year = {2021},
+ title = {Progress of Research \& Development of E-CNY in China},
+ note = {Available at \url{http://www.pbc.gov.cn/en/3688110/3688172/4157443/4293696/2021071614584691871.pdf} [05.05.2022]},
+}
+
+@misc{atlanticcouncil-e-cny,
+ author = {Kunar, Ananya},
+ note = {Available at \url{https://www.atlanticcouncil.org/blogs/econographics/a-report-card-on-chinas-central-bank-digital-currency-the-e-cny/} [05.05.2022]},
+ title = {A Report Card on China's Central Bank Digital Currency: the e-CNY},
+ year = {2022},
+ month = {Jan},
+}
+
+@article{ruiz:hal-01334135,
+ TITLE = {{Reconstructable Software Appliances with Kameleon}},
+ AUTHOR = {Ruiz, Cristian and Harrache, Salem and Mercier, Michael and Richard, Olivier},
+ JOURNAL = {{Operating Systems Review}},
+ PUBLISHER = {{Association for Computing Machinery}},
+ VOLUME = {49},
+ NUMBER = {1},
+ PAGES = {80-89},
+ YEAR = {2015},
+}
+
+@misc{postgres-wiki-perf,
+ url={https://wiki.postgresql.org/wiki/Performance_Optimization},
+ title={PostgreSQL Wiki},
+ publisher={PostgreSQL},
+ author={Postgres},
+ note = {Avaliable at \url{https://wiki.postgresql.org/wiki/Performance_Optimization} [24.04.2022]},
+ year={2020},
+ month={Sep}
+}
+
+@incollection{grid5000,
+ title = {Adding Virtualization Capabilities to the {Grid'5000} Testbed},
+ author = {Balouek, Daniel and Carpen Amarie, Alexandra and Charrier, Ghislain and Desprez, Fr{\'e}d{\'e}ric and Jeannot, Emmanuel and Jeanvoine, Emmanuel and L{\`e}bre, Adrien and Margery, David and Niclausse, Nicolas and Nussbaum, Lucas and Richard, Olivier and P{\'e}rez, Christian and Quesnel, Flavien and Rohr, Cyril and Sarzyniec, Luc},
+ booktitle = {Cloud Computing and Services Science},
+ publisher = {Springer International Publishing},
+ pages = {3-20},
+ volume = {367},
+ year = {2013},
+}
+
+
+@Misc{dirksen2018,
+ author = {Alexandra Dirksen},
+ title = {A Blockchain Picture Book},
+ howpublished = {\url{https://media.ccc.de/v/35c3-9573-a_blockchain_picture_book)}},
+ month = {12},
+ year = {2018},
+}
+
+
+@incollection{crdt,
+ author = {Pregui{\c c}a, Nuno and Baquero, Carlos and Shapiro, Marc},
+ title = {Conflict-Free Replicated Data Types ({CRDT}s)},
+ booktitle = {Encyclopedia of Big Data Technologies},
+ year = {2018},
+ month = may,
+ publisher = {Springer},
+ doi = {10.1007/978-3-319-63962-8_185-1},
+ eprint = {1805.06358},
+ keywords = {introduction}
+}
+
+
+@conference {rogaway2016,
+author = {Phillip Rogaway},
+title = {The Moral Character of Cryptographic Work},
+year = {2016},
+address = {Austin, TX},
+publisher = {USENIX Association},
+month = aug
+}
+@InCollection{ cbdc2021chaum,
+ author = {David Chaum and Christian Grothoff and Thomas Moser},
+ title = {How to Issue a Central Bank Digital Currency},
+ booktitle = {SNB Working Papers},
+ publisher = {Swiss National Bank},
+ year = {2021},
+ number = {2021-3},
+ month = {February},
+}
+
+@article{stainton2023post,
+ title={Post Quantum Sphinx},
+ author={Stainton, David Anthony},
+ journal={Cryptology ePrint Archive},
+ year={2023}
+}
+
+@inproceedings{danezis2009sphinx,
+ title={Sphinx: A compact and provably secure mix format},
+ author={Danezis, George and Goldberg, Ian},
+ booktitle={2009 30th IEEE Symposium on Security and Privacy},
+ pages={269--282},
+ year={2009},
+ organization={IEEE}
+}
+
+@article{diaz2021nym,
+ title={The nym network},
+ author={Diaz, Claudia and Halpin, Harry and Kiayias, Aggelos},
+ year={2021}
+}
+
+@Techreport{ sdsi,
+ title = "SDSI - A Simple Distributed Security Infrastructure",
+ author = "Ronald L. Rivest,Butler Lampson",
+ year = "1996",
+ month = "April",
+ day = "30",
+ url = "http://research.microsoft.com/pubs/68726/acrobat.pdf",
+}
+
+@Article{suerf2023huang,
+ author = {Priscilla Huang and Emmanuel Benoist and Christian Grothoff and Sebastian Javier Marchano},
+ title = {Practical Offline Payments Using One-Time Passcodes},
+ journal = {SUERF Policy Briefs},
+ year = {2023},
+ number = {622},
+ month = {June},
+}
+
+@InProceedings{depolymerization,
+ author = {Antoine d’Aligny and Emmanuel Benoist and Christian Grothoff},
+ title = {Project Depolymerization: Tokenization of Blockchains},
+ booktitle = {4th Conference on Blockchain Research and Applications for Innovative Networks and Services},
+ year = {2022},
+ month = {September},
+}
+
+@inproceedings{evans2009practical,
+ title={A Practical Congestion Attack on Tor Using Long Paths.},
+ author={Evans, Nathan S and Dingledine, Roger and Grothoff, Christian},
+ booktitle={USENIX Security Symposium},
+ pages={33--50},
+ year={2009}
+}
+@inproceedings{jansen2014sniper,
+ title={The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.},
+ author={Jansen, Rob and Tschorsch, Florian and Johnson, Aaron and Scheuermann, Bj{\"o}rn},
+ booktitle={NDSS},
+ year={2014}
+}
+@inproceedings{arp2015torben,
+ title={Torben: A practical side-channel attack for deanonymizing tor communication},
+ author={Arp, Daniel and Yamaguchi, Fabian and Rieck, Konrad},
+ booktitle={Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security},
+ pages={597--602},
+ year={2015}
+}
+@inproceedings{iacovazzi2019duster,
+ title={The $\{$DUSTER$\}$ attack: Tor onion service attribution based on flow watermarking with track hiding},
+ author={Iacovazzi, Alfonso and Frassinelli, Daniel and Elovici, Yuval},
+ booktitle={22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)},
+ pages={213--225},
+ year={2019}
+}
+
+@article{ling2012new,
+ title={A new cell-counting-based attack against Tor},
+ author={Ling, Zhen and Luo, Junzhou and Yu, Wei and Fu, Xinwen and Xuan, Dong and Jia, Weijia},
+ journal={IEEE/ACM Transactions On Networking},
+ volume={20},
+ number={4},
+ pages={1245--1261},
+ year={2012},
+ publisher={IEEE}
+}
+
+@InProceedings{acquisti2003,
+author="Acquisti, Alessandro
+and Dingledine, Roger
+and Syverson, Paul",
+editor="Wright, Rebecca N.",
+title="On the Economics of Anonymity",
+booktitle="Financial Cryptography",
+year="2003",
+publisher="Springer Berlin Heidelberg",
+address="Berlin, Heidelberg",
+pages="84--102",
+abstract="Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios.",
+isbn="978-3-540-45126-6"
+}
+
+
+@INPROCEEDINGS{sp2018anonymity,
+ author={Das, Debajyoti and Meiser, Sebastian and Mohammadi, Esfandiar and Kate, Aniket},
+ booktitle={2018 IEEE Symposium on Security and Privacy (SP)},
+ title={Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two},
+ year={2018},
+ pages={108-126},
+ doi={10.1109/SP.2018.00011}}
+
+@InProceedings{ pitchblack,
+ author = {Nathan S. Evans and Chris GauthierDickey and Christian Grothoff},
+ title = {Routing in the Dark: Pitch Black},
+ booktitle = {23rd Annual Computer Security Applications Conference (ACSAC
+ 2007)},
+ month = {December},
+ location = {Miami Beach, Florida, USA},
+ pages = {305--314},
+ year = {2007},
+ publisher = {IEEE Computer Society},
+}
+
+@article{dijkstra1974selfstabilization,
+author = {Dijkstra, Edsger W.},
+title = {Self-stabilizing systems in spite of distributed control},
+year = {1974},
+issue_date = {Nov. 1974},
+publisher = {Association for Computing Machinery},
+address = {New York, NY, USA},
+volume = {17},
+number = {11},
+issn = {0001-0782},
+url = {https://doi.org/10.1145/361179.361202},
+doi = {10.1145/361179.361202},
+abstract = {The synchronization task between loosely coupled cyclic sequential processes (as can be distinguished in, for instance, operating systems) can be viewed as keeping the relation “the system is in a legitimate state” invariant. As a result, each individual process step that could possibly cause violation of that relation has to be preceded by a test deciding whether the process in question is allowed to proceed or has to be delayed. The resulting design is readily—and quite systematically—implemented if the different processes can be granted mutually exclusive access to a common store in which “the current system state” is recorded.},
+journal = {Commun. ACM},
+month = {nov},
+pages = {643–644},
+numpages = {2},
+keywords = {synchronization, sharing, self-stabilization, self-repair, robustness, networks, mutual exclusion, multiprocessing, harmonious cooperation, error recovery, distributed control}
+}
+
+
+
+
+
+@Misc{pipenet,
+ author = {Wei Dai},
+ title = {PipeNet 1.1},
+ howpublished = {\url{http://www.weidai.com/pipenet.txt}},
+}
+
+@InProceedings{gns2014wachs,
+ author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff},
+ title = {A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System},
+ booktitle = { 13th International Conference on Cryptology and Network Security (CANS 2014)},
+ year = {2014},
+ pages = {127--142},
+}
+@article{eppstein,
+ author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George},
+ title = {What's the Difference?: Efficient Set Reconciliation Without Prior Context},
+ journal = {SIGCOMM Comput. Commun. Rev.},
+ issue_date = {August 2011},
+ volume = {41},
+ number = {4},
+ month = aug,
+ year = {2011},
+ issn = {0146-4833},
+ pages = {218--229},
+ numpages = {12},
+ acmid = {2018462},
+ publisher = {ACM},
+ address = {New York, NY, USA},
+ keywords = {difference digest, invertible bloom filter, set difference},
+}
+
+
+@misc{setu,
+ author = {Elias Summermatter and Christian Grothoff},
+ title = {Byzantine Fault Tolerant Set Reconciliation},
+ howpublished = {\url{https://datatracker.ietf.org/doc/html/draft-summermatter-set-union}},
+ month = {1},
+ year = {2021},
+}