Update bib
This commit is contained in:
		
							
								
								
									
										65
									
								
								these.bib
									
									
									
									
									
								
							
							
						
						
									
										65
									
								
								these.bib
									
									
									
									
									
								
							| @@ -2328,19 +2328,17 @@ | ||||
|   url       = {http://doi.acm.org/10.1145/168588.168596}, | ||||
| } | ||||
|  | ||||
| @Article{CGH04, | ||||
| @InProceedings{CGH98, | ||||
|   author     = {Canetti, Ran and Goldreich, Oded and Halevi, Shai}, | ||||
|   title      = {The Random Oracle Methodology, Revisited}, | ||||
|   journal    = {J. of ACM}, | ||||
|   year       = {2004}, | ||||
|   volume     = {51}, | ||||
|   number     = {4}, | ||||
|   pages      = {557--594}, | ||||
|   issn       = {0004-5411}, | ||||
|   doi        = {10.1145/1008731.1008734}, | ||||
|   issue_date = {July 2004}, | ||||
|   keywords   = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model}, | ||||
|   year       = {1998}, | ||||
|   volume     = {45}, | ||||
|   publisher  = {ACM}, | ||||
|   doi        = {10.1145/1008731.1008734}, | ||||
|   issn       = {0004-5411}, | ||||
|   issue_date = {July 2004}, | ||||
|   journal    = {STOC}, | ||||
|   keywords   = {CS-proofs, Correlation intractability, cryptography, diagonalization, the random-oracle model}, | ||||
|   url        = {http://doi.acm.org/10.1145/1008731.1008734}, | ||||
| } | ||||
|  | ||||
| @@ -2368,19 +2366,6 @@ | ||||
|   url       = {http://doi.acm.org/10.1145/2897845.2897898}, | ||||
| } | ||||
|  | ||||
| @Article{GM84, | ||||
|   author  = {Shafi Goldwasser and Silvio Micali}, | ||||
|   title   = {Probabilistic encryption}, | ||||
|   journal = {J. of Computer and System Sciences}, | ||||
|   year    = {1984}, | ||||
|   volume  = {28}, | ||||
|   number  = {2}, | ||||
|   pages   = {270--299}, | ||||
|   issn    = {0022-0000}, | ||||
|   doi     = {https://doi.org/10.1016/0022-0000(84)90070-9}, | ||||
|   url     = {http://www.sciencedirect.com/science/article/pii/0022000084900709}, | ||||
| } | ||||
|  | ||||
| @Book{Gol04, | ||||
|   title     = {Foundations of Cryptography: Volume 2, Basic Applications}, | ||||
|   publisher = {Cambridge University Press}, | ||||
| @@ -2831,4 +2816,38 @@ | ||||
|   publisher = {Springer}, | ||||
| } | ||||
|  | ||||
| @InProceedings{Nao03, | ||||
|   author    = {Naor, Moni}, | ||||
|   title     = {On cryptographic assumptions and challenges}, | ||||
|   booktitle = {Crypto}, | ||||
|   year      = {2003}, | ||||
|   editor    = {Springer}, | ||||
|   pages     = {96--109}, | ||||
| } | ||||
|  | ||||
| @InProceedings{GM82, | ||||
|   author    = {Goldwasser, Shafi and Micali, Silvio}, | ||||
|   title     = {Probabilistic encryption \& how to play mental poker keeping secret all partial information}, | ||||
|   booktitle = {STOC}, | ||||
|   year      = {1982}, | ||||
|   pages     = {365--377}, | ||||
|   publisher = {ACM}, | ||||
| } | ||||
|  | ||||
| @InProceedings{SOK00, | ||||
|   author    = {Sakai, Ryuichi and Ohgishi, Kiyoshi and Kasahara, Masao}, | ||||
|   title     = {{Cryptosystems Based on Pairings}}, | ||||
|   booktitle = {Symposium on Cryptography and Information Security}, | ||||
|   year      = {2000}, | ||||
|   pages     = {26--28}, | ||||
| } | ||||
|  | ||||
| @Misc{Sco02, | ||||
|   author       = {Scott, Mike}, | ||||
|   title        = {{Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}}, | ||||
|   howpublished = {Cryptology ePrint Archive}, | ||||
|   year         = {2002}, | ||||
|   note         = {\url{https://ia.cr/2002/164}}, | ||||
| } | ||||
|  | ||||
| @Comment{jabref-meta: databaseType:bibtex;} | ||||
|   | ||||
		Reference in New Issue
	
	Block a user