diff --git a/these.bib b/these.bib index 5c68ff2..14e5f51 100644 --- a/these.bib +++ b/these.bib @@ -758,13 +758,14 @@ } @Article{Her11, - author = {Herranz, J.}, - title = {Restricted Adaptive Oblivious Transfer}, - year = {2011}, - volume = {412}, - number = {46}, - pages = {6498--6506}, - journaltitle = {Theoretical Computer Science}, + author = {Herranz, J.}, + title = {Restricted Adaptive Oblivious Transfer}, + journal = {Theoretical Computer Science}, + year = {2011}, + volume = {412}, + number = {46}, + pages = {6498--6506}, + publisher = {Elsevier}, } @InProceedings{HAO15, @@ -883,12 +884,12 @@ url = {https://ia.cr/2016/879}, } -@Article{Lin08, +@InProceedings{Lin08, author = {Lindell, Andrew Y.}, title = {Efficient Fully-Simulatable Oblivious Transfer}, year = {2008}, - journaltitle = {CT-RSA}, series = {LNCS}, + journaltitle = {CT-RSA}, } @InProceedings{LNW15a, @@ -905,16 +906,12 @@ url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19}, } -@Article{Lip08, +@Misc{Lip08, author = {Helger Lipmaa}, - title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, + title = {{Private Branching Programs: On Communication-Efficient Cryptocomputing}}, + howpublished = {Cryptology ePrint Archive, Report 2008/107}, year = {2008}, - volume = {2008}, - pages = {107}, - bibsource = {dblp computer science bibliography, http://dblp.org}, - biburl = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Lipmaa08}, - journaltitle = {{IACR} Cryptology ePrint Archive}, - url = {https://ia.cr/2008/107}, + note = {\url{https://ia.cr/2008/107}}, } @InProceedings{Mer89, @@ -1594,7 +1591,7 @@ @Article{Cha85, author = {Chaum, David}, - title = {Security without Identification: Transactions ssystem to make big brother obsolete}, + title = {{Security without Identification: Transactions System to Make Big Brother Obsolete}}, year = {1985}, volume = {28}, number = {10}, @@ -2784,4 +2781,34 @@ note = {\url{https:/ia.cr/2014/311}}, } +@InProceedings{JR14, + author = {Jutla, Charanjit and Roy, Arnab}, + title = {{Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces}}, + booktitle = {Crypto}, + year = {2014}, + volume = {8617}, + series = {LNCS}, + pages = {295--312}, + publisher = {Springer}, +} + +@InProceedings{PS96, + author = {Pointcheval, David and Stern, Jacques}, + title = {{Security Proofs for Signature Schemes}}, + booktitle = {Eurocrypt}, + year = {1996}, + series = {LNCS}, + pages = {387--398}, + publisher = {Springer}, +} + +@InProceedings{GT03, + author = {Goldwasser, Shafi and Tauman, Kalai Yael}, + title = {{On the (In)security of the Fiat-Shamir Paradigm}}, + booktitle = {FOCS}, + year = {2003}, + pages = {102}, + publisher = {ACM}, +} + @Comment{jabref-meta: databaseType:bibtex;}