| 2008 |
| 60 | | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
Frontiers of Electronic Voting, 29.07. - 03.08.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 |
| 59 | EE | David Chaum,
Richard Carback,
Jeremy Clark,
Aleksander Essex,
Stefan Popoveniuc,
Ronald L. Rivest,
Peter Y. A. Ryan,
Emily Shen,
Alan T. Sherman:
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
EVT 2008 |
| 58 | EE | Meredith L. Patterson,
Len Sassaman,
David Chaum:
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model.
UPSEC 2008 |
| 2007 |
| 57 | EE | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
07311 Abstracts Collection -- Frontiers of Electronic Voting.
Frontiers of Electronic Voting 2007 |
| 56 | EE | David Chaum,
Miroslaw Kutylowski,
Ronald L. Rivest,
Peter Y. A. Ryan:
07311 Executive Summary -- Frontiers of Electronic Voting.
Frontiers of Electronic Voting 2007 |
| 2006 |
| 55 | EE | Ben Adida,
David Chaum,
Susan Hohenberger,
Ronald L. Rivest:
Lightweight Email Signatures (Extended Abstract).
SCN 2006: 288-302 |
| 2005 |
| 54 | EE | David Chaum,
Peter Y. A. Ryan,
Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme.
ESORICS 2005: 118-139 |
| 2004 |
| 53 | EE | Poorvi L. Vora,
Ben Adida,
Ren Bucholz,
David Chaum,
David L. Dill,
David Jefferson,
Douglas W. Jones,
William Lattin,
Aviel D. Rubin,
Michael I. Shamos,
Moti Yung:
Evaluation of voting systems.
Commun. ACM 47(11): 144 (2004) |
| 52 | EE | David Chaum:
Secret-Ballot Receipts: True Voter-Verifiable Elections.
IEEE Security & Privacy 2(1): 38-47 (2004) |
| 1997 |
| 51 | | David Chaum:
On Electronic Commerce: How Much Do You Trust Big Brother? (Interview).
IEEE Internet Computing 1(6): 8-16 (1997) |
| 1994 |
| 50 | EE | David Chaum:
Designated Confirmer Signatures.
EUROCRYPT 1994: 86-91 |
| 1993 |
| 49 | EE | Stefan Brands,
David Chaum:
Distance-Bounding Protocols (Extended Abstract).
EUROCRYPT 1993: 344-359 |
| 1992 |
| 48 | EE | Jurjen N. Bos,
David Chaum:
Provably Unforgeable Signatures.
CRYPTO 1992: 1-14 |
| 47 | EE | David Chaum,
Torben P. Pedersen:
Wallet Databases with Observers.
CRYPTO 1992: 89-105 |
| 46 | EE | David Chaum,
Torben P. Pedersen:
Transferred Cash Grows in Size.
EUROCRYPT 1992: 390-407 |
| 1991 |
| 45 | EE | David Chaum,
Eugène van Heijst,
Birgit Pfitzmann:
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
CRYPTO 1991: 470-484 |
| 44 | | David Chaum:
Numbers Can Be a Better Form of Cash than Paper.
Computer Security and Industrial Cryptography 1991: 174-178 |
| 43 | EE | David Chaum,
Eugène van Heyst:
Group Signatures.
EUROCRYPT 1991: 257-265 |
| 42 | EE | Bart Preneel,
David Chaum,
Walter Fumy,
Cees J. A. Jansen,
Peter Landrock,
Gert Roelofsen:
Race Integrity Primitives Evaluation (RIPE): A Status Report.
EUROCRYPT 1991: 547-551 |
| 41 | EE | David Chaum:
Some Weaknesses of "Weaknesses of Undeniable Signatures".
EUROCRYPT 1991: 554-556 |
| 40 | EE | Tatsuaki Okamoto,
David Chaum,
Kazuo Ohta:
Direct Zero Knowledge Proofs of Computational Power in Five Rounds.
EUROCRYPT 1991: 96-105 |
| 1990 |
| 39 | | David Chaum:
Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms.
AUSCRYPT 1990: 246-264 |
| 38 | EE | Joan Boyar,
David Chaum,
Ivan Damgård,
Torben P. Pedersen:
Convertible Undeniable Signatures.
CRYPTO 1990: 189-205 |
| 37 | EE | David Chaum,
Sandra Roijakkers:
Unconditionally Secure Digital Signatures.
CRYPTO 1990: 206-214 |
| 36 | EE | David Chaum:
Zero-Knowledge Undeniable Signatures.
EUROCRYPT 1990: 458-464 |
| 1989 |
| 35 | EE | David Chaum,
Hans Van Antwerpen:
Undeniable Signatures.
CRYPTO 1989: 212-216 |
| 34 | EE | David Chaum:
The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities.
CRYPTO 1989: 591-602 |
| 33 | EE | Joos Vandewalle,
David Chaum,
Walter Fumy,
Cees J. A. Jansen,
Peter Landrock,
Gert Roelofsen:
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
EUROCRYPT 1989: 267-271 |
| 32 | EE | David Chaum:
Online Cash Checks.
EUROCRYPT 1989: 288-293 |
| 31 | EE | David Chaum,
Bert den Boer,
Eugène van Heyst,
Stig Fr. Mjølsnes,
Adri Steenbeek:
Efficient Offline Electronic Checks (Extended Abstract).
EUROCRYPT 1989: 294-301 |
| 1988 |
| 30 | | David Chaum,
Wyn L. Price:
Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings
Springer 1988 |
| 29 | EE | David Chaum,
Amos Fiat,
Moni Naor:
Untraceable Electronic Cash.
CRYPTO 1988: 319-327 |
| 28 | EE | David Chaum:
Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA.
EUROCRYPT 1988: 177-182 |
| 27 | | David Chaum,
Claude Crépeau,
Ivan Damgård:
Multiparty Unconditionally Secure Protocols (Extended Abstract)
STOC 1988: 11-19 |
| 26 | | Gilles Brassard,
David Chaum,
Claude Crépeau:
Minimum Disclosure Proofs of Knowledge.
J. Comput. Syst. Sci. 37(2): 156-189 (1988) |
| 25 | | David Chaum:
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability.
J. Cryptology 1(1): 65-75 (1988) |
| 1987 |
| 24 | EE | Ernest F. Brickell,
David Chaum,
Ivan Damgård,
Jeroen van de Graaf:
Gradual and Verifiable Release of a Secret.
CRYPTO 1987: 156-166 |
| 23 | EE | David Chaum,
Claude Crépeau,
Ivan Damgård:
Multiparty Unconditionally Secure Protocols (Abstract).
CRYPTO 1987: 462 |
| 22 | EE | David Chaum,
Ivan Damgård,
Jeroen van de Graaf:
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result.
CRYPTO 1987: 87-119 |
| 21 | EE | David Chaum,
Jan-Hendrik Evertse,
Jeroen van de Graaf:
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.
EUROCRYPT 1987: 127-141 |
| 20 | EE | David Chaum:
Blinding for Unanticipated Signatures.
EUROCRYPT 1987: 227-233 |
| 19 | | David Chaum:
Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Großen Bruder der Vergangenheit angehören lassen - Zur Diskussion gestellt.
Informatik Spektrum 10(5): 262-277 (1987) |
| 1986 |
| 18 | EE | David Chaum,
Jan-Hendrik Evertse:
A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations.
CRYPTO 1986: 118-167 |
| 17 | EE | David Chaum:
Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How.
CRYPTO 1986: 195-199 |
| 16 | EE | David Chaum,
Jan-Hendrik Evertse,
Jeroen van de Graaf,
René Peralta:
Demonstrating Possession of a Discrete Logarithm Without Revealing It.
CRYPTO 1986: 200-212 |
| 15 | EE | Wiebren de Jonge,
David Chaum:
Some Variations on RSA Signatures and Their Security.
CRYPTO 1986: 49-59 |
| 1985 |
| 14 | | G. R. Blakley,
David Chaum:
Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings
Springer 1985 |
| 13 | EE | Wiebren de Jonge,
David Chaum:
Attacks on Some RSA Signatures.
CRYPTO 1985: 18-27 |
| 12 | EE | David Chaum,
Jan-Hendrik Evertse:
Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers.
CRYPTO 1985: 192-211 |
| 11 | | David Chaum:
New Secret Codes can Prevent a Computerized Big Brother.
Datenschutz und Datensicherung 1985: 33-34 |
| 10 | EE | David Chaum:
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms.
EUROCRYPT 1985: 241-244 |
| 9 | | David Chaum:
Security Without Identification: Transaction Systems to Make Big Brother Obsolete.
Commun. ACM 28(10): 1030-1044 (1985) |
| 1984 |
| 8 | EE | David Chaum:
New Secret Codes Can Prevent a Computerized Big Brother (Abstract).
CRYPTO 1984: 432-433 |
| 7 | EE | David Chaum:
How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems.
CRYPTO 1984: 481-485 |
| 6 | | David Chaum:
A New Paradigm for Individuals in the Information Age.
IEEE Symposium on Security and Privacy 1984: 99-106 |
| 1983 |
| 5 | | David Chaum:
Blind Signature System.
CRYPTO 1983: 153 |
| 4 | | David Chaum:
Design Concepts for Tamper Responding Systems.
CRYPTO 1983: 387-392 |
| 1982 |
| 3 | | David Chaum:
Blind Signatures for Untraceable Payments.
CRYPTO 1982: 199-203 |
| 1981 |
| 2 | | David Chaum:
Verification by Anonymous Monitors.
CRYPTO 1981: 138-139 |
| 1 | | David Chaum:
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Commun. ACM 24(2): 84-88 (1981) |