From e42bd4d7e8018cd74123aef5dd8b6210f4334d46 Mon Sep 17 00:00:00 2001 From: Fabrice Mouhartem Date: Tue, 12 Jun 2018 14:16:25 +0200 Subject: [PATCH] Update bib --- these.bib | 65 +++++++++++++++++++++++++++++++++++-------------------- 1 file changed, 42 insertions(+), 23 deletions(-) diff --git a/these.bib b/these.bib index 853e1f7..a5661f7 100644 --- a/these.bib +++ b/these.bib @@ -2328,19 +2328,17 @@ url = {http://doi.acm.org/10.1145/168588.168596}, } -@Article{CGH04, +@InProceedings{CGH98, author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai}, title = {The Random Oracle Methodology, Revisited}, - journal = {J. of ACM}, - year = {2004}, - volume = {51}, - number = {4}, - pages = {557--594}, - issn = {0004-5411}, - doi = {10.1145/1008731.1008734}, - issue_date = {July 2004}, - keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model}, + year = {1998}, + volume = {45}, publisher = {ACM}, + doi = {10.1145/1008731.1008734}, + issn = {0004-5411}, + issue_date = {July 2004}, + journal = {STOC}, + keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model}, url = {http://doi.acm.org/10.1145/1008731.1008734}, } @@ -2368,19 +2366,6 @@ url = {http://doi.acm.org/10.1145/2897845.2897898}, } -@Article{GM84, - author = {Shafi Goldwasser and Silvio Micali}, - title = {Probabilistic encryption}, - journal = {J. of Computer and System Sciences}, - year = {1984}, - volume = {28}, - number = {2}, - pages = {270--299}, - issn = {0022-0000}, - doi = {https://doi.org/10.1016/0022-0000(84)90070-9}, - url = {http://www.sciencedirect.com/science/article/pii/0022000084900709}, -} - @Book{Gol04, title = {Foundations of Cryptography: Volume 2, Basic Applications}, publisher = {Cambridge University Press}, @@ -2831,4 +2816,38 @@ publisher = {Springer}, } +@InProceedings{Nao03, + author = {Naor, Moni}, + title = {On cryptographic assumptions and challenges}, + booktitle = {Crypto}, + year = {2003}, + editor = {Springer}, + pages = {96--109}, +} + +@InProceedings{GM82, + author = {Goldwasser, Shafi and Micali, Silvio}, + title = {Probabilistic encryption \& how to play mental poker keeping secret all partial information}, + booktitle = {STOC}, + year = {1982}, + pages = {365--377}, + publisher = {ACM}, +} + +@InProceedings{SOK00, + author = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao}, + title = {{Cryptosystems Based on Pairings}}, + booktitle = {Symposium on Cryptography and Information Security}, + year = {2000}, + pages = {26--28}, +} + +@Misc{Sco02, + author = {Scott, Mike}, + title = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}}, + howpublished = {Cryptology ePrint Archive}, + year = {2002}, + note = {\url{https://ia.cr/2002/164}}, +} + @Comment{jabref-meta: databaseType:bibtex;}