[16123] in cryptography@c2.net mail archive
Re: references on traffic analysis?
daemon@ATHENA.MIT.EDU (Adam Shostack)
Thu Sep  9 00:32:44 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 8 Sep 2004 16:21:53 -0400
From: Adam Shostack <adam@homeport.org>
To: Steve Bellovin <smb@research.att.com>
Cc: cryptography@metzdowd.com
In-Reply-To: <20040908031203.5295E1AE89@berkshire.research.att.com>
On Tue, Sep 07, 2004 at 11:12:03PM -0400, Steve Bellovin wrote:
| What are some of the classic, must-read, references on traffic analysis?
| (I'm familiar with the Zendian problem, of course.)
A. Back, U. Muller, and A. Stiglic, Traffic Analysis Attacks and
Trade-Offs in Anonymity Providing Systems, Proceedings of the 4th
Information Hiding Workshop (IHW2001), Springer-Verlag, LNCS v. 2137,
pp. 243-254. http://crypto.cs.mcgill.ca/~stiglic/Papers/traffic.pdf
There have been some good papers in the PET Workshop series, if you
care about analysis of MIX type networks.  http://petworkshop.org/
Adam
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com