-
Notifications
You must be signed in to change notification settings - Fork 3
/
bibliography.bib
103 lines (93 loc) · 4.19 KB
/
bibliography.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
@article{DBLP:journals/corr/Micali16,
author = {Silvio Micali},
title = {{ALGORAND:} The Efficient and Democratic Ledger},
journal = {CoRR},
volume = {abs/1607.01341},
year = {2016},
url = {http://arxiv.org/abs/1607.01341},
eprinttype = {arXiv},
eprint = {1607.01341},
timestamp = {Mon, 13 Aug 2018 16:48:44 +0200},
biburl = {https://dblp.org/rec/journals/corr/Micali16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/GiladHMVZ17,
author = {Yossi Gilad and
Rotem Hemo and
Silvio Micali and
Georgios Vlachos and
Nickolai Zeldovich},
title = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies},
booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles,
Shanghai, China, October 28-31, 2017},
pages = {51--68},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3132747.3132757},
doi = {10.1145/3132747.3132757},
timestamp = {Tue, 06 Nov 2018 16:59:32 +0100},
biburl = {https://dblp.org/rec/conf/sosp/GiladHMVZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{cryptoeprint:2017/454,
author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich},
title = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies},
howpublished = {Cryptology ePrint Archive, Paper 2017/454},
year = {2017},
note = {\url{https://eprint.iacr.org/2017/454}},
url = {https://eprint.iacr.org/2017/454}
}
@misc{NIST.FIPS.180-4,
author = {Quynh Dang},
title = {Secure Hash Standard (SHS)},
year = {2012},
month = {2012-03-06},
publisher = {Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, Gaithersburg, MD},
doi = {https://doi.org/10.6028/NIST.FIPS.180-4},
language = {en},
}
@misc{algorand:specs,
author = {{Algorand Foundation}},
title = {Algorand Transaction Execution Approval Language},
howpublished = {Github Repository for the Algorand Foundation},
year = {2023},
month = may,
note = {\url{https://github.com/algorandfoundation/specs/releases/tag/abd3d48}},
url = {https://github.com/algorandfoundation/specs/releases/tag/abd3d48}
}
@inproceedings{MicaliRabinVadhan:1999,
author = {Silvio Micali, Michael Rabin, Salil Vadhan},
title = {Verifiable random functions},
booktitle = {Proceedings of the 40th IEEE Symposium on Foundations of Computer Science},
pages = {120--130},
year = 1999
}
@inproceedings{Bernstein:2006,
author = {Daniel J. Bernstein},
title = {Curve25519: New Diffie-Hellman Speed Records},
year = {2006},
isbn = {3540338519},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
url = {https://doi.org/10.1007/11745853_14},
doi = {10.1007/11745853_14},
abstract = {This paper explains the design and implementation of a high-security elliptic-curve-Diffie-Hellman function achieving record-setting speeds: e.g., 832457 Pentium III cycles (with several side benefits: free key compression, free key validation, and state-of-the-art timing-attack protection), more than twice as fast as other authors' results at the same conjectured security level (with or without the side benefits).},
booktitle = {Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography},
pages = {207–228},
numpages = {22},
keywords = {new software, elliptic curves, point multiplication, high conjectured security, Diffie-Hellman, constant time, high speed, new curve, short keys},
location = {New York, NY},
series = {PKC'06}
}
@inproceedings{Gunther:1990,
author = {Christoph G. Gunther},
title = {An Identity-Based Key-Exchange Protocol},
year = {1990},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
booktitle = {Workshop on the Theory and Application of Cryptographic Techniques},
pages = {29--37},
location = {Houthalen, Belgium},
series = {EUROCRYPT '89}
}
Günther, C. G. (1990). An identity-based key-exchange protocol. Advances in Cryptology EUROCRYPT '89 (LNCS 434). pp. 29–37.