Update bib
This commit is contained in:
parent
50daac44e3
commit
e42bd4d7e8
65
these.bib
65
these.bib
@ -2328,19 +2328,17 @@
|
||||
url = {http://doi.acm.org/10.1145/168588.168596},
|
||||
}
|
||||
|
||||
@Article{CGH04,
|
||||
@InProceedings{CGH98,
|
||||
author = {Canetti, Ran and Goldreich, Oded and Halevi, Shai},
|
||||
title = {The Random Oracle Methodology, Revisited},
|
||||
journal = {J. of ACM},
|
||||
year = {2004},
|
||||
volume = {51},
|
||||
number = {4},
|
||||
pages = {557--594},
|
||||
issn = {0004-5411},
|
||||
doi = {10.1145/1008731.1008734},
|
||||
issue_date = {July 2004},
|
||||
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
||||
year = {1998},
|
||||
volume = {45},
|
||||
publisher = {ACM},
|
||||
doi = {10.1145/1008731.1008734},
|
||||
issn = {0004-5411},
|
||||
issue_date = {July 2004},
|
||||
journal = {STOC},
|
||||
keywords = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model},
|
||||
url = {http://doi.acm.org/10.1145/1008731.1008734},
|
||||
}
|
||||
|
||||
@ -2368,19 +2366,6 @@
|
||||
url = {http://doi.acm.org/10.1145/2897845.2897898},
|
||||
}
|
||||
|
||||
@Article{GM84,
|
||||
author = {Shafi Goldwasser and Silvio Micali},
|
||||
title = {Probabilistic encryption},
|
||||
journal = {J. of Computer and System Sciences},
|
||||
year = {1984},
|
||||
volume = {28},
|
||||
number = {2},
|
||||
pages = {270--299},
|
||||
issn = {0022-0000},
|
||||
doi = {https://doi.org/10.1016/0022-0000(84)90070-9},
|
||||
url = {http://www.sciencedirect.com/science/article/pii/0022000084900709},
|
||||
}
|
||||
|
||||
@Book{Gol04,
|
||||
title = {Foundations of Cryptography: Volume 2, Basic Applications},
|
||||
publisher = {Cambridge University Press},
|
||||
@ -2831,4 +2816,38 @@
|
||||
publisher = {Springer},
|
||||
}
|
||||
|
||||
@InProceedings{Nao03,
|
||||
author = {Naor, Moni},
|
||||
title = {On cryptographic assumptions and challenges},
|
||||
booktitle = {Crypto},
|
||||
year = {2003},
|
||||
editor = {Springer},
|
||||
pages = {96--109},
|
||||
}
|
||||
|
||||
@InProceedings{GM82,
|
||||
author = {Goldwasser, Shafi and Micali, Silvio},
|
||||
title = {Probabilistic encryption \& how to play mental poker keeping secret all partial information},
|
||||
booktitle = {STOC},
|
||||
year = {1982},
|
||||
pages = {365--377},
|
||||
publisher = {ACM},
|
||||
}
|
||||
|
||||
@InProceedings{SOK00,
|
||||
author = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao},
|
||||
title = {{Cryptosystems Based on Pairings}},
|
||||
booktitle = {Symposium on Cryptography and Information Security},
|
||||
year = {2000},
|
||||
pages = {26--28},
|
||||
}
|
||||
|
||||
@Misc{Sco02,
|
||||
author = {Scott, Mike},
|
||||
title = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}},
|
||||
howpublished = {Cryptology ePrint Archive},
|
||||
year = {2002},
|
||||
note = {\url{https://ia.cr/2002/164}},
|
||||
}
|
||||
|
||||
@Comment{jabref-meta: databaseType:bibtex;}
|
||||
|
Loading…
Reference in New Issue
Block a user