Corrections in Biblio
This commit is contained in:
parent
6dd5ee6e3c
commit
73e934e564
63
these.bib
63
these.bib
|
@ -758,13 +758,14 @@
|
|||
}
|
||||
|
||||
@Article{Her11,
|
||||
author = {Herranz, J.},
|
||||
title = {Restricted Adaptive Oblivious Transfer},
|
||||
year = {2011},
|
||||
volume = {412},
|
||||
number = {46},
|
||||
pages = {6498--6506},
|
||||
journaltitle = {Theoretical Computer Science},
|
||||
author = {Herranz, J.},
|
||||
title = {Restricted Adaptive Oblivious Transfer},
|
||||
journal = {Theoretical Computer Science},
|
||||
year = {2011},
|
||||
volume = {412},
|
||||
number = {46},
|
||||
pages = {6498--6506},
|
||||
publisher = {Elsevier},
|
||||
}
|
||||
|
||||
@InProceedings{HAO15,
|
||||
|
@ -883,12 +884,12 @@
|
|||
url = {https://ia.cr/2016/879},
|
||||
}
|
||||
|
||||
@Article{Lin08,
|
||||
@InProceedings{Lin08,
|
||||
author = {Lindell, Andrew Y.},
|
||||
title = {Efficient Fully-Simulatable Oblivious Transfer},
|
||||
year = {2008},
|
||||
journaltitle = {CT-RSA},
|
||||
series = {LNCS},
|
||||
journaltitle = {CT-RSA},
|
||||
}
|
||||
|
||||
@InProceedings{LNW15a,
|
||||
|
@ -905,16 +906,12 @@
|
|||
url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19},
|
||||
}
|
||||
|
||||
@Article{Lip08,
|
||||
@Misc{Lip08,
|
||||
author = {Helger Lipmaa},
|
||||
title = {Private Branching Programs: On Communication-Efficient Cryptocomputing},
|
||||
title = {{Private Branching Programs: On Communication-Efficient Cryptocomputing}},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2008/107},
|
||||
year = {2008},
|
||||
volume = {2008},
|
||||
pages = {107},
|
||||
bibsource = {dblp computer science bibliography, http://dblp.org},
|
||||
biburl = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Lipmaa08},
|
||||
journaltitle = {{IACR} Cryptology ePrint Archive},
|
||||
url = {https://ia.cr/2008/107},
|
||||
note = {\url{https://ia.cr/2008/107}},
|
||||
}
|
||||
|
||||
@InProceedings{Mer89,
|
||||
|
@ -1594,7 +1591,7 @@
|
|||
|
||||
@Article{Cha85,
|
||||
author = {Chaum, David},
|
||||
title = {Security without Identification: Transactions ssystem to make big brother obsolete},
|
||||
title = {{Security without Identification: Transactions System to Make Big Brother Obsolete}},
|
||||
year = {1985},
|
||||
volume = {28},
|
||||
number = {10},
|
||||
|
@ -2784,4 +2781,34 @@
|
|||
note = {\url{https:/ia.cr/2014/311}},
|
||||
}
|
||||
|
||||
@InProceedings{JR14,
|
||||
author = {Jutla, Charanjit and Roy, Arnab},
|
||||
title = {{Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces}},
|
||||
booktitle = {Crypto},
|
||||
year = {2014},
|
||||
volume = {8617},
|
||||
series = {LNCS},
|
||||
pages = {295--312},
|
||||
publisher = {Springer},
|
||||
}
|
||||
|
||||
@InProceedings{PS96,
|
||||
author = {Pointcheval, David and Stern, Jacques},
|
||||
title = {{Security Proofs for Signature Schemes}},
|
||||
booktitle = {Eurocrypt},
|
||||
year = {1996},
|
||||
series = {LNCS},
|
||||
pages = {387--398},
|
||||
publisher = {Springer},
|
||||
}
|
||||
|
||||
@InProceedings{GT03,
|
||||
author = {Goldwasser, Shafi and Tauman, Kalai Yael},
|
||||
title = {{On the (In)security of the Fiat-Shamir Paradigm}},
|
||||
booktitle = {FOCS},
|
||||
year = {2003},
|
||||
pages = {102},
|
||||
publisher = {ACM},
|
||||
}
|
||||
|
||||
@Comment{jabref-meta: databaseType:bibtex;}
|
||||
|
|
Loading…
Reference in New Issue
Block a user