Add two papers

This commit is contained in:
Jeffrey Burdges 2017-08-17 18:19:26 +02:00
parent d30f7e90af
commit 7d21331d5f
No known key found for this signature in database
GPG Key ID: ABAC7FD1CC100A74

View File

@ -216,14 +216,6 @@
} }
@misc{Martens2015,
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
author = {Patrick M{\"a}rtens},
howpublished = {IACR Cryptology ePrint Archive 2015/086},
year = {2015},
note = {\url{http://eprint.iacr.org/2015/086}},
}
@inproceedings{zerocash, @inproceedings{zerocash,
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
@ -344,6 +336,40 @@
year={2015} year={2015}
} }
@misc{Martens2015,
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
author = {Patrick M{\"a}rtens},
howpublished = {IACR Cryptology ePrint Archive 2015/086},
year = {2015},
note = {\url{http://eprint.iacr.org/2015/086}},
}
@misc{CPST-DivisibleMadePractical,
author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré},
title = {Divisible E-Cash Made Practical},
howpublished = {Cryptology ePrint Archive, Report 2014/785},
year = {2014},
note = {\url{http://eprint.iacr.org/2014/785}},
}
@Inbook{CPST-CutDownTheTree,
author="Pointcheval, David and Sanders, Olivier and Traor{\'e}, Jacques",
editor="Fehr, Serge",
title="Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash",
bookTitle="Public-Key Cryptography -- PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I",
year="2017",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="61--90",
isbn="978-3-662-54365-8",
doi="10.1007/978-3-662-54365-8_4",
doi_url="https://doi.org/10.1007/978-3-662-54365-8_4"
note = {Cryptology ePrint Archive, Report 2015/972 \url{http://eprint.iacr.org/2015/972}},
url = {http://eprint.iacr.org/2015/972},
}
@book{molander1998cyberpayments, @book{molander1998cyberpayments,
title={Cyberpayments and money laundering: Problems and promise}, title={Cyberpayments and money laundering: Problems and promise},
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A}, author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
@ -362,7 +388,7 @@
} }
@article{OneMoreInversion, @article{OneMoreInversion,
author="Bellare and Namprempre and Pointcheval and Semanko", author="Bellare and Namprempre and Pointcheval and Semanko",
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ", title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
journal="Journal of Cryptology", journal="Journal of Cryptology",
@ -377,7 +403,7 @@
} }
@inbook{RSA-FDH-KTIvCTI, @inbook{RSA-FDH-KTIvCTI,
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael", author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
editor="Syverson, Paul", editor="Syverson, Paul",
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme", chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
@ -392,7 +418,7 @@
} }
@inbook{Coron2000, @inbook{Coron2000,
author="Coron, Jean-S{\'e}bastien", author="Coron, Jean-S{\'e}bastien",
editor="Bellare, Mihir", editor="Bellare, Mihir",
chapter="On the Exact Security of Full Domain Hash", chapter="On the Exact Security of Full Domain Hash",