Kaist Al Fuzzy, Kwangsu Lee, “Construction of Pseudo-Random Permutation using Unbalanced Feistel Network”, Jul. 29, 1999, http://monami.kaist.ac.kr/˜guspin/seminar/prp_ufn/.* |
Michael Luby, Charles Rackoff, Pseudo-random Permutation Generators and Cryptographic Composition, 1986, ACM.* |
Mihir Bellare, Ted Krovetz, Phillip Rogaway, Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-Inverticable, Oct. 17, 1998, Advances in Cryptology—Eurocrypt 98 Proceedings.* |
Masayuki, Abe, “University Verifiable Mix-net with Verification Work Independent of the Number if Mix-servers”, 1998, Advances in Cyptology—EUROCRYPT'98, LNCS 1403, pp. 437-447.* |
Menezes, Alfred J., Handbook of Appied Cryptogrpahy, 1197, CRC Press, p. 250-251, 263, 408-411, 459.* |
Chaum, David, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms”, Feb. 1981, Communication of the ACM, vol. 24, No. 2.* |
Goldschlag, David, “Onion Routing for Anonymous and Private Internet Connections”, Jan., 28, 1999, Center for High Assurance Computer Systems.* |
Jakobsson, Markus, “A Practical Mix”, 1998, Advances in Crptology—EUROCRYPT'98, LNCS 1403, pp. 448-461.* |
Reiter, Michael, “Crowds, Anonymity for Web Transactions”, Nov. 1998, ACM Transaction on Informatin and System Security, vol. 1, No. 1, pp. 66-92. |