diff --git a/chap-GS-background.tex b/chap-GS-background.tex index c634304..c07a80f 100644 --- a/chap-GS-background.tex +++ b/chap-GS-background.tex @@ -168,6 +168,7 @@ provides $\join_{\user}$ with $(i,\scr_{i },\crt_{i })$. \section{Associated Security Notions} \addcontentsline{tof}{section}{\protect\numberline{\thesection} Notions de sécurité associées} +\label{sse:gs-sec-notions} \subsection{Oracles for Security Experiments} \addcontentsline{tof}{subsection}{\protect\numberline{\thesubsection} Oracles nécessaires à la définition des expériences de sécurité} diff --git a/chap-proofs.tex b/chap-proofs.tex index b75981e..973076a 100644 --- a/chap-proofs.tex +++ b/chap-proofs.tex @@ -115,7 +115,7 @@ an attack is successful if the probability that it succeed is noticeable. \end{definition} Once we defined these notions related to the core of the proof, we have to define the objects on what we work on. -Namely, defining \textit{what we want to prove}, and the hypotheses on which we rely, also called ``\textit{hardness assumption}''. +Namely, defining \textit{what we want to prove}, and the hypotheses on which we rely, also called ``\textit{hardness assumptions}''. \index{Hardness assumptions} The details of the hardness assumptions we use are given in Chapter~\ref{ch:structures}.