gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] manuscripts ./gzigzag.bib Sigs/article.rst


From: Benja Fallenstein
Subject: [Gzz-commits] manuscripts ./gzigzag.bib Sigs/article.rst
Date: Mon, 19 May 2003 17:20:49 -0400

CVSROOT:        /cvsroot/gzz
Module name:    manuscripts
Changes by:     Benja Fallenstein <address@hidden>      03/05/19 17:20:49

Modified files:
        .              : gzigzag.bib 
        Sigs           : article.rst 

Log message:
        more refs

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/manuscripts/gzigzag.bib.diff?tr1=1.109&tr2=1.110&r1=text&r2=text
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/manuscripts/Sigs/article.rst.diff?tr1=1.139&tr2=1.140&r1=text&r2=text

Patches:
Index: manuscripts/Sigs/article.rst
diff -u manuscripts/Sigs/article.rst:1.139 manuscripts/Sigs/article.rst:1.140
--- manuscripts/Sigs/article.rst:1.139  Mon May 19 17:18:18 2003
+++ manuscripts/Sigs/article.rst        Mon May 19 17:20:49 2003
@@ -138,8 +138,8 @@
 scheme, and 2) a random oracle function. We generally assume
 that the random oracle is the same hash function (e.g. SHA-1)
 as in the underlying signature scheme. Usually, this scheme
-will be a Merkle hash tree [XXX] of Merkle 
-one-time signatures [XXX]. Other choices such as BiBa [XXX]
+will be a Merkle hash tree [merkle80protocols]_ of Merkle 
+one-time signatures [merkle87digital]_. Other choices such as BiBa [XXX]
 are possible, but not evaluated in this article.
 
 The private key for this scheme is simply a private key
Index: manuscripts/gzigzag.bib
diff -u manuscripts/gzigzag.bib:1.109 manuscripts/gzigzag.bib:1.110
--- manuscripts/gzigzag.bib:1.109       Sat May 17 11:26:04 2003
+++ manuscripts/gzigzag.bib     Mon May 19 17:20:48 2003
@@ -5778,7 +5778,7 @@
     year      = {1996},
     isbn      = {3-540-60922-9},
     bibsource = {DBLP, http://dblp.uni-trier.de},
-    url = "citeseer.nj.nec.com/bleichenbacher96optimal.html" 
+    url = "http://citeseer.nj.nec.com/bleichenbacher96optimal.html"; 
 }
 
 
@@ -5790,7 +5790,7 @@
     number = "1",
     pages = "35--67",
     year = "1996",
-    url = "citeseer.nj.nec.com/goldreich94lineoffline.html" 
+    url = "http://citeseer.nj.nec.com/goldreich94lineoffline.html"; 
 }
 
 @article{ even96lineoffline,
@@ -5801,13 +5801,13 @@
     number = "1",
     pages = "35--67",
     year = "1996",
-    url = "citeseer.nj.nec.com/goldreich94lineoffline.html" 
+    url = "http://citeseer.nj.nec.com/goldreich94lineoffline.html"; 
 }
 
 @misc{ mitzenmacher-bounds,
   author = "Michael Mitzenmacher and Adrian Perrig",
   title = "Bounds and Improvements for BiBa Signature Schemes",
-  url = "citeseer.nj.nec.com/mitzenmacher02bounds.html" 
+  url = "http://citeseer.nj.nec.com/mitzenmacher02bounds.html"; 
 }
  
 @techreport{ reyzin02better,
@@ -5815,7 +5815,7 @@
     title = "Better than {BiBa}: Short One-time Signatures with Fast Signing 
and Verifying",
     number = "2002/014",
     year = "2002",
-    url = "citeseer.nj.nec.com/reyzin02better.html" 
+    url = "http://citeseer.nj.nec.com/reyzin02better.html"; 
 }
 
 @inproceedings{ perrig01biba,
@@ -5824,7 +5824,7 @@
     booktitle = "{ACM} Conference on Computer and Communications Security",
     pages = "28-37",
     year = "2001",
-    url = "citeseer.nj.nec.com/perrig01biba.html" 
+    url = "http://citeseer.nj.nec.com/perrig01biba.html"; 
 }
 
 @inproceedings{ bellare93random,
@@ -5833,5 +5833,46 @@
     booktitle = "{ACM} Conference on Computer and Communications Security",
     pages = "62-73",
     year = "1993",
-    url = "citeseer.nj.nec.com/bellare95random.html" 
+    url = "http://citeseer.nj.nec.com/bellare95random.html"; 
+}
+
address@hidden lamport79constructing,
+    author = "Leslie Lamport",
+    title = "Constructing digital signatures from one-way functions",
+    number = "SRI-CSL-98",
+    institution = "SRI International Computer Science Laboratory",
+    month = oct,
+    year = 1979
+}
+
address@hidden,
+    author = { M.O.Rabin },
+    title = "Digitalized Signatures",
+    booktitle = "Foundations of Secure Computation",
+    editor = "R.A.DeMillo and D.P.Dobkin and A.K.Jones and R.J.Lipton",
+    publisher = "Academic Press",
+    year = "1978",
+    pages = "155--168",
+}
+
address@hidden,
+    author = "Ralph C. Merkle",
+    title = "Protocols for public key cryptosystems",
+    booktitle = "IEEE Symposium on Security and Privacy",
+    year = "1980",
+    pages = "122--134"
+}
+
address@hidden,
+  author    = {Ralph C. Merkle},
+  title     = {A Digital Signature Based on a Conventional Encryption 
Function},
+  booktitle = {Proceedings of CRYPTO '87},
+  pages     = {369--378},
+  editor    = {Carl Pomerance},
+  publisher = {Springer},
+  series    = {Lecture Notes in Computer Science},
+  volume    = {293},
+  year      = {1988},
+  isbn      = {3-540-18796-0},
+  bibsource = {DBLP, http://dblp.uni-trier.de}
 }




reply via email to

[Prev in Thread] Current Thread [Next in Thread]