Some corrections
This commit is contained in:
parent
7afe13529e
commit
07ea8c5643
@ -168,6 +168,7 @@ provides $\join_{\user}$ with $(i,\scr_{i },\crt_{i })$.
|
|||||||
|
|
||||||
\section{Associated Security Notions}
|
\section{Associated Security Notions}
|
||||||
\addcontentsline{tof}{section}{\protect\numberline{\thesection} Notions de sécurité associées}
|
\addcontentsline{tof}{section}{\protect\numberline{\thesection} Notions de sécurité associées}
|
||||||
|
\label{sse:gs-sec-notions}
|
||||||
|
|
||||||
\subsection{Oracles for Security Experiments}
|
\subsection{Oracles for Security Experiments}
|
||||||
\addcontentsline{tof}{subsection}{\protect\numberline{\thesubsection} Oracles nécessaires à la définition des expériences de sécurité}
|
\addcontentsline{tof}{subsection}{\protect\numberline{\thesubsection} Oracles nécessaires à la définition des expériences de sécurité}
|
||||||
|
@ -115,7 +115,7 @@ an attack is successful if the probability that it succeed is noticeable.
|
|||||||
\end{definition}
|
\end{definition}
|
||||||
|
|
||||||
Once we defined these notions related to the core of the proof, we have to define the objects on what we work on.
|
Once we defined these notions related to the core of the proof, we have to define the objects on what we work on.
|
||||||
Namely, defining \textit{what we want to prove}, and the hypotheses on which we rely, also called ``\textit{hardness assumption}''.
|
Namely, defining \textit{what we want to prove}, and the hypotheses on which we rely, also called ``\textit{hardness assumptions}''.
|
||||||
\index{Hardness assumptions}
|
\index{Hardness assumptions}
|
||||||
|
|
||||||
The details of the hardness assumptions we use are given in Chapter~\ref{ch:structures}.
|
The details of the hardness assumptions we use are given in Chapter~\ref{ch:structures}.
|
||||||
|
Loading…
Reference in New Issue
Block a user