@article{nakamoto2008bitcoin,
  title={Bitcoin: A peer-to-peer electronic cash system},
  author={Nakamoto, Satoshi},
  year={2008}
}

@InProceedings{apod,
  author =       {Elli Androulaki and Steven Bellovin},
  title =        {APOD: Anonymous Physical Object Delivery},
  booktitle = {Symposium on Privacy-Enhancing Technologies (PETS)},
  year =      {2009},
}

@Article{blum1981,
  author = 	 {Manuel Blum},
  title = 	 {Coin Flipping by Telephone},
  journal = 	 {CRYPTO},
  year = 	 {1981},
  pages = 	 {11-15},
}


@Misc{greece2015cash,
  author =    {Reuters},
  title =     {Greek council recommends 60 euro limit on ATM withdrawals from Tuesday},
  howpublished = {\url{http://www.reuters.com/article/2015/06/28/eurozone-greece-limits-idUSA8N0Z302P20150628}},
  month =     {June},
  year =      {2015},
}

@Misc{france2015cash,
  author =    {Heinz-Peter Bader},
  title =     {France steps up monitoring of cash payments to fight low-cost terrorism},
  howpublished = {\url{http://www.reuters.com/article/2015/03/18/us-france-security-financing-idUSKBN0ME14720150318}},
  month =     {Mar},
  year =      {2015},
}


@Misc{fatf1997,
  title =     {FATF-IX report on money laundering typologies},
  howpublished = {\url{http://www.fatf-gafi.org/media/fatf/documents/reports/1996\%201997\%20ENG.pdf}},
  month =     {feb},
  year =      {1998},
}

@InProceedings{sander1999escrow,
  author =       {Tomas Sander and Amnon Ta-Shma},
  title =        {On Anonymous Electronic Cash and Crime},
  booktitle = {ISW'99},
  year =      {1999},
  series =    {LNCS 1729},
  pages =     {202--206},
}

@Article{solms1992perfect,
  author =       {Sebastiaan H. von Solms and David Naccache},
  title =        {On blind signatures and perfect crimes},
  journal = {Computers \& Security},
  year =      {1992},
  volume =    {11},
  number =    {6},
  pages =     {581--583},
}

@inproceedings{chaum1990untraceable,
  title={Untraceable electronic cash},
  author={Chaum, David and Fiat, Amos and Naor, Moni},
  booktitle={Proceedings on Advances in cryptology},
  pages={319--327},
  year={1990},
  organization={Springer-Verlag New York, Inc.}
}

@inproceedings{chaum1983blind,
  title={Blind signatures for untraceable payments},
  author={Chaum, David},
  booktitle={Advances in cryptology},
  pages={199--203},
  year={1983},
  organization={Springer}
}

@inproceedings{rivest2004peppercoin,
  title={Peppercoin micropayments},
  author={Rivest, Ronald L},
  booktitle={Financial Cryptography},
  pages={2--8},
  year={2004},
  organization={Springer}
}

@inproceedings{miers2013zerocoin,
  title={Zerocoin: Anonymous distributed e-cash from bitcoin},
  author={Miers, Ian and Garman, Christina and Green, Matthew and Rubin, Aviel D},
  booktitle={Security and Privacy (SP), 2013 IEEE Symposium on},
  pages={397--411},
  year={2013},
  organization={IEEE}
}



@InProceedings{fc2014murdoch,
  author =       {Stephen Murdoch and Ross Anderson},
  title =        {Security Protocols and Evidence: Where Many Payment Systems Fail},
  booktitle = {Financial Cryptography and Data Security},
  year =      {2014},
}

@book{ engels1844,
  author = 	 "Friedrich Engels",
  title = 	 "{Umrisse zu einer Kritik der National\"okonomie}",
  year = 	 "1844",
  publisher = "Ruge and Marx, Paris",
}


@inproceedings{selby2004analyzing,
  title={Analyzing the Success and Failure of Recent e-Payment Schemes},
  author={Selby, Jack R},
  booktitle={Financial Cryptography},
  pages={1--1},
  year={2004},
  organization={Springer}
}

@misc{brands1993efficient,
  title={An efficient off-line electronic cash system based on the representation problem},
  author={Brands, Stefan A},
  year={1993},
  publisher={Centrum voor Wiskunde en Informatica}
}

@article{dent2008extensions,
  title={Extensions to Chaum's Blind Signature Scheme and OpenCoin Requirements},
  author={Dent, AW and Paterson, KG and Wild, PR},
  year={2008}
}

@article{dent2008preliminary,
  title={Preliminary Report on Chaum's Online E-Cash Architecture},
  author={Dent, AW and Paterson, KG and Wild, PR},
  journal={Royal Holloway, University of London},
  year={2008}
}



@inproceedings{tor-design,
  title = {Tor: The Second-Generation Onion Router},
  author = {Roger Dingledine and Nick Mathewson and Paul Syverson},
  booktitle = {Proceedings of the 13th USENIX Security Symposium},
  year = {2004},
  month = {August},
  www_important = {1},
  www_tags = {selected},
  www_html_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.html},
  www_pdf_url = {https://www.torproject.org/svn/trunk/doc/design-paper/tor-design.pdf},
  www_section = {Anonymous communication},
}


@inbook{BellareRogaway1996,
  author="Bellare, Mihir and Rogaway, Phillip",
  editor="Maurer, Ueli",
  chapter="The Exact Security of Digital Signatures-How to Sign with RSA and Rabin",
  title="Advances in Cryptology --- EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12--16, 1996 Proceedings",
  year="1996",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="399--416",
  isbn="978-3-540-68339-1",
  doi="10.1007/3-540-68339-9_34",
  url_doi="http://dx.doi.org/10.1007/3-540-68339-9_34",
  url="http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf"
}



@article{OneMoreInversion,
  author="Bellare and Namprempre and Pointcheval and Semanko",
  title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
  journal="Journal of Cryptology",
  volume="16",
  number="3",
  pages="185--215",
  abstract="We introduce a new class of computational problems which we call the ``one-more-RSA-inversion'' problems. Our main result is that two problems in this class, which we call the chosen-target and known-target inversion problems, respectively, have polynomially equivalent computational complexity. We show how this leads to a proof of security for Chaum's RSA-based blind signature scheme in the random oracle model based on the assumed hardness of either of these problems. We define and prove analogous results for ``one-more-discrete-logarithm'' problems. Since the appearence of the preliminary version of this paper, the new problems we have introduced have found other uses as well.",
  issn="1432-1378",
  doi="10.1007/s00145-002-0120-1",
  doi_url="http://dx.doi.org/10.1007/s00145-002-0120-1",
  url="https://eprint.iacr.org/2001/002"
}


@inbook{RSA-HDF-KTIvCTI,
  author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
  editor="Syverson, Paul",
  chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
  title="Financial Cryptography: 5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19--22, 2001 Proceedings",
  year="2002",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="319--338",
  isbn="978-3-540-46088-6",
  doi="10.1007/3-540-46088-8_25",
  url="https://www.di.ens.fr/~pointche/Documents/Papers/2001_fcA.pdf"
}


@inbook{Coron2000,
  author="Coron, Jean-S{\'e}bastien",
  editor="Bellare, Mihir",
  chapter="On the Exact Security of Full Domain Hash",
  title="Advances in Cryptology --- CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20--24, 2000 Proceedings",
  year="2000",
  publisher="Springer Berlin Heidelberg",
  address="Berlin, Heidelberg",
  pages="229--235",
  isbn="978-3-540-44598-2",
  doi="10.1007/3-540-44598-6_14",
  doi_url="http://dx.doi.org/10.1007/3-540-44598-6_14",
  url="https://www.iacr.org/archive/crypto2000/18800229/18800229.pdf"
}