<aside> ℹ️ 📌 = most important papers

</aside>

📌 F. Shirazi, M. Simeonovski, M. R. Asghar, M. Backes, and C. Diaz, “A Survey on Routing in Anonymous Communication Protocols.”

📌 C. Kuhn, M. Beck, S. Schiffner, E. Jorswieck, and T. Strufe, “On Privacy Notions in Anonymous Communication.”

📌 A. M. Piotrowska, J. Hayes, T. Elahi, S. Meiser, and G. Danezis, “The Loopix Anonymity System”.

📌 C. Diaz, S. J. Murdoch, and C. Troncoso, “Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks,”

📌 C. Diaz, H. Halpin, and A. Kiayias, “The Nym Network. The Next Generation of Privacy Infrastructure”.

📌 G. Danezis and I. Goldberg, “Sphinx: A Compact and Provably Secure Mix Format,”

G. Danezis, “Mix-Networks with Restricted Routes,” in Privacy Enhancing Technologies, R. Dingledine, Ed.

P. Mittal and N. Borisov, “Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems”.

P. Syverson, “Why I’m Not an Entropist,” in Security Protocols XVII, 2013

C. Chen, D. E. Asoni, A. Perrig, D. Barrera, G. Danezis, and C. Troncoso, “TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer.”

C. Troncoso, M. Isaakidis, G. Danezis, and H. Halpin, “Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments”

P. Mittal and N. Borisov, “ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies”

O. Heen, E. L. Merrer, C. Neumann, and S. Onno, “Pretty Private Group Management,”

J. Domingo-Ferrer and M. Bras-Amorós, “Peer-to-Peer Private Information Retrieval,” in Privacy in Statistical Databases

Q. Wang and N. Borisov, “Octopus: A Secure and Anonymous DHT Lookup.”

F. Béres, I. A. Seres, D. M. Kelen, and A. A. Benczúr, “ethp2psim: Evaluating and deploying privacy-enhanced peer-to-peer routing protocols for the Ethereum network.”

C. W. O’Donnell and V. Vaikuntanathan, “Information leak in the chord lookup protocol,”

M. Kondo, S. Saito, K. Ishiguro, H. Tanaka, and H. Matsuo, “Bifrost : A Novel Anonymous Communication System with DHT,”

C. Troncoso, M. Isaakidis, G. Danezis, and H. Halpin, “Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments,”