Update bib
This commit is contained in:
parent
50daac44e3
commit
e42bd4d7e8
65
these.bib
65
these.bib
@ -2328,19 +2328,17 @@
|
|||||||
url = {http://doi.acm.org/10.1145/168588.168596},
|
url = {http://doi.acm.org/10.1145/168588.168596},
|
||||||
}
|
}
|
||||||
|
|
||||||
@Article{CGH04,
|
@InProceedings{CGH98,
|
||||||
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
||||||
title = {The Random Oracle Methodology, Revisited},
|
title = {The Random Oracle Methodology, Revisited},
|
||||||
journal = {J. of ACM},
|
year = {1998},
|
||||||
year = {2004},
|
volume = {45},
|
||||||
volume = {51},
|
|
||||||
number = {4},
|
|
||||||
pages = {557--594},
|
|
||||||
issn = {0004-5411},
|
|
||||||
doi = {10.1145/1008731.1008734},
|
|
||||||
issue_date = {July 2004},
|
|
||||||
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
|
||||||
publisher = {ACM},
|
publisher = {ACM},
|
||||||
|
doi = {10.1145/1008731.1008734},
|
||||||
|
issn = {0004-5411},
|
||||||
|
issue_date = {July 2004},
|
||||||
|
journal = {STOC},
|
||||||
|
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
||||||
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2368,19 +2366,6 @@
|
|||||||
url = {http://doi.acm.org/10.1145/2897845.2897898},
|
url = {http://doi.acm.org/10.1145/2897845.2897898},
|
||||||
}
|
}
|
||||||
|
|
||||||
@Article{GM84,
|
|
||||||
author = {Shafi Goldwasser and Silvio Micali},
|
|
||||||
title = {Probabilistic encryption},
|
|
||||||
journal = {J. of Computer and System Sciences},
|
|
||||||
year = {1984},
|
|
||||||
volume = {28},
|
|
||||||
number = {2},
|
|
||||||
pages = {270--299},
|
|
||||||
issn = {0022-0000},
|
|
||||||
doi = {https://doi.org/10.1016/0022-0000(84)90070-9},
|
|
||||||
url = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
|
|
||||||
}
|
|
||||||
|
|
||||||
@Book{Gol04,
|
@Book{Gol04,
|
||||||
title = {Foundations of Cryptography: Volume 2, Basic Applications},
|
title = {Foundations of Cryptography: Volume 2, Basic Applications},
|
||||||
publisher = {Cambridge University Press},
|
publisher = {Cambridge University Press},
|
||||||
@ -2831,4 +2816,38 @@
|
|||||||
publisher = {Springer},
|
publisher = {Springer},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@InProceedings{Nao03,
|
||||||
|
author = {Naor, Moni},
|
||||||
|
title = {On cryptographic assumptions and challenges},
|
||||||
|
booktitle = {Crypto},
|
||||||
|
year = {2003},
|
||||||
|
editor = {Springer},
|
||||||
|
pages = {96--109},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{GM82,
|
||||||
|
author = {Goldwasser, Shafi and Micali, Silvio},
|
||||||
|
title = {Probabilistic encryption \& how to play mental poker keeping secret all partial information},
|
||||||
|
booktitle = {STOC},
|
||||||
|
year = {1982},
|
||||||
|
pages = {365--377},
|
||||||
|
publisher = {ACM},
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{SOK00,
|
||||||
|
author = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao},
|
||||||
|
title = {{Cryptosystems Based on Pairings}},
|
||||||
|
booktitle = {Symposium on Cryptography and Information Security},
|
||||||
|
year = {2000},
|
||||||
|
pages = {26--28},
|
||||||
|
}
|
||||||
|
|
||||||
|
@Misc{Sco02,
|
||||||
|
author = {Scott, Mike},
|
||||||
|
title = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}},
|
||||||
|
howpublished = {Cryptology ePrint Archive},
|
||||||
|
year = {2002},
|
||||||
|
note = {\url{https://ia.cr/2002/164}},
|
||||||
|
}
|
||||||
|
|
||||||
@Comment{jabref-meta: databaseType:bibtex;}
|
@Comment{jabref-meta: databaseType:bibtex;}
|
||||||
|
Loading…
Reference in New Issue
Block a user