Update bib

This commit is contained in:
Fabrice Mouhartem 2018-06-12 14:16:25 +02:00
parent 50daac44e3
commit e42bd4d7e8

View File

@ -2328,19 +2328,17 @@
url = {http://doi.acm.org/10.1145/168588.168596}, url = {http://doi.acm.org/10.1145/168588.168596},
} }
@Article{CGH04, @InProceedings{CGH98,
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai}, author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
title = {The Random Oracle Methodology, Revisited}, title = {The Random Oracle Methodology, Revisited},
journal = {J. of ACM}, year = {1998},
year = {2004}, volume = {45},
volume = {51},
number = {4},
pages = {557--594},
issn = {0004-5411},
doi = {10.1145/1008731.1008734},
issue_date = {July 2004},
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
publisher = {ACM}, publisher = {ACM},
doi = {10.1145/1008731.1008734},
issn = {0004-5411},
issue_date = {July 2004},
journal = {STOC},
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
url = {http://doi.acm.org/10.1145/1008731.1008734}, url = {http://doi.acm.org/10.1145/1008731.1008734},
} }
@ -2368,19 +2366,6 @@
url = {http://doi.acm.org/10.1145/2897845.2897898}, url = {http://doi.acm.org/10.1145/2897845.2897898},
} }
@Article{GM84,
author = {Shafi Goldwasser and Silvio Micali},
title = {Probabilistic encryption},
journal = {J. of Computer and System Sciences},
year = {1984},
volume = {28},
number = {2},
pages = {270--299},
issn = {0022-0000},
doi = {https://doi.org/10.1016/0022-0000(84)90070-9},
url = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
}
@Book{Gol04, @Book{Gol04,
title = {Foundations of Cryptography: Volume 2, Basic Applications}, title = {Foundations of Cryptography: Volume 2, Basic Applications},
publisher = {Cambridge University Press}, publisher = {Cambridge University Press},
@ -2831,4 +2816,38 @@
publisher = {Springer}, publisher = {Springer},
} }
@InProceedings{Nao03,
author = {Naor, Moni},
title = {On cryptographic assumptions and challenges},
booktitle = {Crypto},
year = {2003},
editor = {Springer},
pages = {96--109},
}
@InProceedings{GM82,
author = {Goldwasser, Shafi and Micali, Silvio},
title = {Probabilistic encryption \& how to play mental poker keeping secret all partial information},
booktitle = {STOC},
year = {1982},
pages = {365--377},
publisher = {ACM},
}
@InProceedings{SOK00,
author = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao},
title = {{Cryptosystems Based on Pairings}},
booktitle = {Symposium on Cryptography and Information Security},
year = {2000},
pages = {26--28},
}
@Misc{Sco02,
author = {Scott, Mike},
title = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}},
howpublished = {Cryptology ePrint Archive},
year = {2002},
note = {\url{https://ia.cr/2002/164}},
}
@Comment{jabref-meta: databaseType:bibtex;} @Comment{jabref-meta: databaseType:bibtex;}