summaryrefslogtreecommitdiff
path: root/summary/taler.bib
diff options
context:
space:
mode:
Diffstat (limited to 'summary/taler.bib')
-rw-r--r--summary/taler.bib249
1 files changed, 249 insertions, 0 deletions
diff --git a/summary/taler.bib b/summary/taler.bib
new file mode 100644
index 0000000..b22e9eb
--- /dev/null
+++ b/summary/taler.bib
@@ -0,0 +1,249 @@
+@article{nakamoto2008bitcoin,
+ title={Bitcoin: A peer-to-peer electronic cash system},
+ author={Nakamoto, Satoshi},
+ year={2008}
+}
+
+@InProceedings{apod,
+ author = {Elli Androulaki and Steven Bellovin},
+ title = {APOD: Anonymous Physical Object Delivery},
+ booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
+ year = {2009},
+}
+
+@Article{blum1981,
+ author = {Manuel Blum},
+ title = {Coin Flipping by Telephone},
+ journal = {CRYPTO},
+ year = {1981},
+ pages = {11-15},
+}
+
+
+@Misc{greece2015cash,
+ author = {Reuters},
+ title = {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
+ howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
+ month = {June},
+ year = {2015},
+}
+
+@Misc{france2015cash,
+ author = {Heinz-Peter Bader},
+ title = {France steps up monitoring of cash payments to fight low-cost terrorism},
+ howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
+ month = {Mar},
+ year = {2015},
+}
+
+
+@Misc{fatf1997,
+ title = {FATF-IX report on money laundering typologies},
+ howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
+ month = {feb},
+ year = {1998},
+}
+
+@TechReport{,
+ author = {},
+ title = {},
+ institution = {},
+ year = {},
+ OPTkey = {},
+ OPTtype = {},
+ OPTnumber = {},
+ OPTaddress = {},
+ OPTmonth = {},
+ OPTnote = {},
+ OPTannote = {}
+}
+
+@InProceedings{sander1999escrow,
+ author = {Tomas Sander and Amnon Ta-Shma},
+ title = {On Anonymous Electronic Cash and Crime},
+ booktitle = {ISW'99},
+ year = {1999},
+ series = {LNCS 1729},
+ pages = {202--206},
+}
+
+@Article{solms1992perfect,
+ author = {Sebastiaan H. von Solms and David Naccache},
+ title = {On blind signatures and perfect crimes},
+ journal = {Computers \& Security},
+ year = {1992},
+ volume = {11},
+ number = {6},
+ pages = {581--583},
+}
+
+@inproceedings{chaum1990untraceable,
+ title={Untraceable electronic cash},
+ author={Chaum, David and Fiat, Amos and Naor, Moni},
+ booktitle={Proceedings on Advances in cryptology},
+ pages={319--327},
+ year={1990},
+ organization={Springer-Verlag New York, Inc.}
+}
+
+@inproceedings{chaum1983blind,
+ title={Blind signatures for untraceable payments},
+ author={Chaum, David},
+ booktitle={Advances in cryptology},
+ pages={199--203},
+ year={1983},
+ organization={Springer}
+}
+
+@inproceedings{rivest2004peppercoin,
+ title={Peppercoin micropayments},
+ author={Rivest, Ronald L},
+ booktitle={Financial Cryptography},
+ pages={2--8},
+ year={2004},
+ organization={Springer}
+}
+
+@inproceedings{miers2013zerocoin,
+ title={Zerocoin: Anonymous distributed e-cash from bitcoin},
+ author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
+ booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
+ pages={397--411},
+ year={2013},
+ organization={IEEE}
+}
+
+
+
+@InProceedings{fc2014murdoch,
+ author = {Stephen Murdoch and Ross Anderson},
+ title = {Security Protocols and Evidence: Where Many Payment Systems Fail},
+ booktitle = {Financial Cryptography and Data Security},
+ year = {2014},
+}
+
+@book{ engels1844,
+ author = "Friedrich Engels",
+ title = "{Umrisse zu einer Kritik der National\"okonomie}",
+ year = "1844",
+ publisher = "Ruge and Marx, Paris",
+}
+
+
+@inproceedings{selby2004analyzing,
+ title={Analyzing the Success and Failure of Recent e-Payment Schemes},
+ author={Selby, Jack R},
+ booktitle={Financial Cryptography},
+ pages={1--1},
+ year={2004},
+ organization={Springer}
+}
+
+@misc{brands1993efficient,
+ title={An efficient off-line electronic cash system based on the representation problem},
+ author={Brands, Stefan A},
+ year={1993},
+ publisher={Centrum voor Wiskunde en Informatica}
+}
+
+@article{dent2008extensions,
+ title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
+ author={Dent, AW and Paterson, KG and Wild, PR},
+ year={2008}
+}
+
+@article{dent2008preliminary,
+ title={Preliminary Report on Chaum's Online E-Cash Architecture},
+ author={Dent, AW and Paterson, KG and Wild, PR},
+ journal={Royal Holloway, University of London},
+ year={2008}
+}
+
+
+
+@inproceedings{tor-design,
+ title = {Tor: The Second-Generation Onion Router},
+ author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
+ booktitle = {Proceedings of the 13th USENIX Security Symposium},
+ year = {2004},
+ month = {August},
+ www_important = {1},
+ www_tags = {selected},
+ www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
+ www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
+ www_section = {Anonymous communication},
+}
+
+
+@inbook{BellareRogaway1996,
+ author="Bellare, Mihir and Rogaway, Phillip",
+ editor="Maurer, Ueli",
+ chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin",
+ title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings",
+ year="1996",
+ publisher="Springer Berlin Heidelberg",
+ address="Berlin, Heidelberg",
+ pages="399--416",
+ isbn="978-3-540-68339-1",
+ doi="10.1007/3-540-68339-9_34",
+ url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34",
+ url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf"
+}
+
+
+
+@article{OneMoreInversion,
+ author="Bellare and Namprempre and Pointcheval and Semanko",
+ title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
+ journal="Journal of Cryptology",
+ volume="16",
+ number="3",
+ pages="185--215",
+ abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearence of the preliminary version of this paper, the new problems we have introduced have found other uses as well.",
+ issn="1432-1378",
+ doi="10.1007/s00145-002-0120-1",
+ doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1",
+ url="https://eprint.iacr.org/2001/002"
+}
+
+@misc{cryptoeprint:2001:002,
+ author = {M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko},
+ title = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme},
+ howpublished = {Cryptology ePrint Archive, Report 2001/002},
+ year = {2001},
+ note = {\url{http://eprint.iacr.org/}},
+}
+
+
+@inbook{RSA-KTIvCTI,
+ author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
+ editor="Syverson, Paul",
+ chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
+ title="Financial Cryptography: 5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19--22, 2001 Proceedings",
+ year="2002",
+ publisher="Springer Berlin Heidelberg",
+ address="Berlin, Heidelberg",
+ pages="319--338",
+ isbn="978-3-540-46088-6",
+ doi="10.1007/3-540-46088-8_25",
+ url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf"
+}
+
+
+@inbook{Coron2000,
+ author="Coron, Jean-S{\'e}bastien",
+ editor="Bellare, Mihir",
+ chapter="On the Exact Security of Full Domain Hash",
+ title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings",
+ year="2000",
+ publisher="Springer Berlin Heidelberg",
+ address="Berlin, Heidelberg",
+ pages="229--235",
+ isbn="978-3-540-44598-2",
+ doi="10.1007/3-540-44598-6_14",
+ doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14",
+ url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf"
+}
+
+
+