1. Alexopoulos, Nikolaos, Kiayias, Aggelos, Talviste, Riivo, Zacharias, Thomas, 2017. MCMix: Anonymous messaging via secure multiparty computation. In: 26th {USENIX} Security Symposium ({USENIX} Security 17). pp. 1217–1234.
2. Angel, Sebastian, Setty, Srinath, 2016. Unobservable communication over fully untrusted infrastructure. In: 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). pp. 551–569.
3. Traffic analysis attacks and trade-offs in anonymity providing systems;Back,2001
4. Bauer, Kevin, McCoy, Damon, Grunwald, Dirk, Kohno, Tadayoshi, Sicker, Douglas, 2007. Low-resource routing attacks against Tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society. pp. 11–20.
5. Efficient zero-knowledge argument for correctness of a shuffle;Bayer,2012