Corrections in Biblio

This commit is contained in:
Fabrice Mouhartem 2018-04-30 14:54:35 +02:00
parent 6dd5ee6e3c
commit 73e934e564

View File

@ -760,11 +760,12 @@
@Article{Her11, @Article{Her11,
author = {Herranz, J.}, author = {Herranz, J.},
title = {Restricted Adaptive Oblivious Transfer}, title = {Restricted Adaptive Oblivious Transfer},
journal = {Theoretical Computer Science},
year = {2011}, year = {2011},
volume = {412}, volume = {412},
number = {46}, number = {46},
pages = {6498--6506}, pages = {6498--6506},
journaltitle = {Theoretical Computer Science}, publisher = {Elsevier},
} }
@InProceedings{HAO15, @InProceedings{HAO15,
@ -883,12 +884,12 @@
url = {https://ia.cr/2016/879}, url = {https://ia.cr/2016/879},
} }
@Article{Lin08, @InProceedings{Lin08,
author = {Lindell, Andrew Y.}, author = {Lindell, Andrew Y.},
title = {Efficient Fully-Simulatable Oblivious Transfer}, title = {Efficient Fully-Simulatable Oblivious Transfer},
year = {2008}, year = {2008},
journaltitle = {CT-RSA},
series = {LNCS}, series = {LNCS},
journaltitle = {CT-RSA},
} }
@InProceedings{LNW15a, @InProceedings{LNW15a,
@ -905,16 +906,12 @@
url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19}, url = {http://dx.doi.org/10.1007/978-3-662-46447-2_19},
} }
@Article{Lip08, @Misc{Lip08,
author = {Helger Lipmaa}, author = {Helger Lipmaa},
title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, title = {{Private Branching Programs: On Communication-Efficient Cryptocomputing}},
howpublished = {Cryptology ePrint Archive, Report 2008/107},
year = {2008}, year = {2008},
volume = {2008}, note = {\url{https://ia.cr/2008/107}},
pages = {107},
bibsource = {dblp computer science bibliography, http://dblp.org},
biburl = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Lipmaa08},
journaltitle = {{IACR} Cryptology ePrint Archive},
url = {https://ia.cr/2008/107},
} }
@InProceedings{Mer89, @InProceedings{Mer89,
@ -1594,7 +1591,7 @@
@Article{Cha85, @Article{Cha85,
author = {Chaum, David}, author = {Chaum, David},
title = {Security without Identification: Transactions ssystem to make big brother obsolete}, title = {{Security without Identification: Transactions System to Make Big Brother Obsolete}},
year = {1985}, year = {1985},
volume = {28}, volume = {28},
number = {10}, number = {10},
@ -2784,4 +2781,34 @@
note = {\url{https:/ia.cr/2014/311}}, note = {\url{https:/ia.cr/2014/311}},
} }
@InProceedings{JR14,
author = {Jutla, Charanjit and Roy, Arnab},
title = {{Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces}},
booktitle = {Crypto},
year = {2014},
volume = {8617},
series = {LNCS},
pages = {295--312},
publisher = {Springer},
}
@InProceedings{PS96,
author = {Pointcheval, David and Stern, Jacques},
title = {{Security Proofs for Signature Schemes}},
booktitle = {Eurocrypt},
year = {1996},
series = {LNCS},
pages = {387--398},
publisher = {Springer},
}
@InProceedings{GT03,
author = {Goldwasser, Shafi and Tauman, Kalai Yael},
title = {{On the (In)security of the Fiat-Shamir Paradigm}},
booktitle = {FOCS},
year = {2003},
pages = {102},
publisher = {ACM},
}
@Comment{jabref-meta: databaseType:bibtex;} @Comment{jabref-meta: databaseType:bibtex;}