Add two papers
This commit is contained in:
parent
d30f7e90af
commit
7d21331d5f
@ -216,14 +216,6 @@
|
||||
}
|
||||
|
||||
|
||||
@misc{Martens2015,
|
||||
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
|
||||
author = {Patrick M{\"a}rtens},
|
||||
howpublished = {IACR Cryptology ePrint Archive 2015/086},
|
||||
year = {2015},
|
||||
note = {\url{http://eprint.iacr.org/2015/086}},
|
||||
}
|
||||
|
||||
|
||||
@inproceedings{zerocash,
|
||||
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
|
||||
@ -344,6 +336,40 @@
|
||||
year={2015}
|
||||
}
|
||||
|
||||
@misc{Martens2015,
|
||||
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
|
||||
author = {Patrick M{\"a}rtens},
|
||||
howpublished = {IACR Cryptology ePrint Archive 2015/086},
|
||||
year = {2015},
|
||||
note = {\url{http://eprint.iacr.org/2015/086}},
|
||||
}
|
||||
|
||||
@misc{CPST-DivisibleMadePractical,
|
||||
author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré},
|
||||
title = {Divisible E-Cash Made Practical},
|
||||
howpublished = {Cryptology ePrint Archive, Report 2014/785},
|
||||
year = {2014},
|
||||
note = {\url{http://eprint.iacr.org/2014/785}},
|
||||
}
|
||||
|
||||
@Inbook{CPST-CutDownTheTree,
|
||||
author="Pointcheval, David and Sanders, Olivier and Traor{\'e}, Jacques",
|
||||
editor="Fehr, Serge",
|
||||
title="Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash",
|
||||
bookTitle="Public-Key Cryptography -- PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I",
|
||||
year="2017",
|
||||
publisher="Springer Berlin Heidelberg",
|
||||
address="Berlin, Heidelberg",
|
||||
pages="61--90",
|
||||
isbn="978-3-662-54365-8",
|
||||
doi="10.1007/978-3-662-54365-8_4",
|
||||
doi_url="https://doi.org/10.1007/978-3-662-54365-8_4"
|
||||
note = {Cryptology ePrint Archive, Report 2015/972 \url{http://eprint.iacr.org/2015/972}},
|
||||
url = {http://eprint.iacr.org/2015/972},
|
||||
}
|
||||
|
||||
|
||||
|
||||
@book{molander1998cyberpayments,
|
||||
title={Cyberpayments and money laundering: Problems and promise},
|
||||
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
|
||||
@ -362,7 +388,7 @@
|
||||
}
|
||||
|
||||
|
||||
@article{OneMoreInversion,
|
||||
@article{OneMoreInversion,
|
||||
author="Bellare and Namprempre and Pointcheval and Semanko",
|
||||
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
|
||||
journal="Journal of Cryptology",
|
||||
@ -377,7 +403,7 @@
|
||||
}
|
||||
|
||||
|
||||
@inbook{RSA-FDH-KTIvCTI,
|
||||
@inbook{RSA-FDH-KTIvCTI,
|
||||
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
|
||||
editor="Syverson, Paul",
|
||||
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
|
||||
@ -392,7 +418,7 @@
|
||||
}
|
||||
|
||||
|
||||
@inbook{Coron2000,
|
||||
@inbook{Coron2000,
|
||||
author="Coron, Jean-S{\'e}bastien",
|
||||
editor="Bellare, Mihir",
|
||||
chapter="On the Exact Security of Full Domain Hash",
|
||||
|
Loading…
Reference in New Issue
Block a user