Add two papers
This commit is contained in:
parent
d30f7e90af
commit
7d21331d5f
@ -216,14 +216,6 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@misc{Martens2015,
|
|
||||||
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
|
|
||||||
author = {Patrick M{\"a}rtens},
|
|
||||||
howpublished = {IACR Cryptology ePrint Archive 2015/086},
|
|
||||||
year = {2015},
|
|
||||||
note = {\url{http://eprint.iacr.org/2015/086}},
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
@inproceedings{zerocash,
|
@inproceedings{zerocash,
|
||||||
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
|
author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
|
||||||
@ -344,6 +336,40 @@
|
|||||||
year={2015}
|
year={2015}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@misc{Martens2015,
|
||||||
|
title = {Practical Compact E-Cash with Arbitrary Wallet Size},
|
||||||
|
author = {Patrick M{\"a}rtens},
|
||||||
|
howpublished = {IACR Cryptology ePrint Archive 2015/086},
|
||||||
|
year = {2015},
|
||||||
|
note = {\url{http://eprint.iacr.org/2015/086}},
|
||||||
|
}
|
||||||
|
|
||||||
|
@misc{CPST-DivisibleMadePractical,
|
||||||
|
author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré},
|
||||||
|
title = {Divisible E-Cash Made Practical},
|
||||||
|
howpublished = {Cryptology ePrint Archive, Report 2014/785},
|
||||||
|
year = {2014},
|
||||||
|
note = {\url{http://eprint.iacr.org/2014/785}},
|
||||||
|
}
|
||||||
|
|
||||||
|
@Inbook{CPST-CutDownTheTree,
|
||||||
|
author="Pointcheval, David and Sanders, Olivier and Traor{\'e}, Jacques",
|
||||||
|
editor="Fehr, Serge",
|
||||||
|
title="Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash",
|
||||||
|
bookTitle="Public-Key Cryptography -- PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I",
|
||||||
|
year="2017",
|
||||||
|
publisher="Springer Berlin Heidelberg",
|
||||||
|
address="Berlin, Heidelberg",
|
||||||
|
pages="61--90",
|
||||||
|
isbn="978-3-662-54365-8",
|
||||||
|
doi="10.1007/978-3-662-54365-8_4",
|
||||||
|
doi_url="https://doi.org/10.1007/978-3-662-54365-8_4"
|
||||||
|
note = {Cryptology ePrint Archive, Report 2015/972 \url{http://eprint.iacr.org/2015/972}},
|
||||||
|
url = {http://eprint.iacr.org/2015/972},
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@book{molander1998cyberpayments,
|
@book{molander1998cyberpayments,
|
||||||
title={Cyberpayments and money laundering: Problems and promise},
|
title={Cyberpayments and money laundering: Problems and promise},
|
||||||
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
|
author={Molander, Roger C and Mussington, David A and Mussington, David and Wilson, Peter A},
|
||||||
@ -362,7 +388,7 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@article{OneMoreInversion,
|
@article{OneMoreInversion,
|
||||||
author="Bellare and Namprempre and Pointcheval and Semanko",
|
author="Bellare and Namprempre and Pointcheval and Semanko",
|
||||||
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
|
title="The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme ",
|
||||||
journal="Journal of Cryptology",
|
journal="Journal of Cryptology",
|
||||||
@ -377,7 +403,7 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@inbook{RSA-FDH-KTIvCTI,
|
@inbook{RSA-FDH-KTIvCTI,
|
||||||
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
|
author="Bellare, Mihir and Namprempre, Chanathip and Pointcheval, David and Semanko, Michael",
|
||||||
editor="Syverson, Paul",
|
editor="Syverson, Paul",
|
||||||
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
|
chapter="The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme",
|
||||||
@ -392,7 +418,7 @@
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@inbook{Coron2000,
|
@inbook{Coron2000,
|
||||||
author="Coron, Jean-S{\'e}bastien",
|
author="Coron, Jean-S{\'e}bastien",
|
||||||
editor="Bellare, Mihir",
|
editor="Bellare, Mihir",
|
||||||
chapter="On the Exact Security of Full Domain Hash",
|
chapter="On the Exact Security of Full Domain Hash",
|
||||||
|
Loading…
Reference in New Issue
Block a user