aboutsummaryrefslogtreecommitdiff
path: root/spec/srv-spec/security-analysis.md
diff options
context:
space:
mode:
Diffstat (limited to 'spec/srv-spec/security-analysis.md')
-rw-r--r--spec/srv-spec/security-analysis.md8
1 files changed, 4 insertions, 4 deletions
diff --git a/spec/srv-spec/security-analysis.md b/spec/srv-spec/security-analysis.md
index 658c2f8..a1cc72d 100644
--- a/spec/srv-spec/security-analysis.md
+++ b/spec/srv-spec/security-analysis.md
@@ -19,12 +19,12 @@ for now.
Here are some examples of possible future directions:
-- Schemes based on threshold signatures (e.g. see [HOPPER])
-- Unicorn scheme by Lenstra et al. [UNICORN]
-- Schemes based on Verifiable Delay Functions [VDFS]
+- Schemes based on threshold signatures (e.g. see \[HOPPER\])
+- Unicorn scheme by Lenstra et al. \[UNICORN\]
+- Schemes based on Verifiable Delay Functions \[VDFS\]
For more alternative approaches on collaborative random number generation
-also see the discussion at [RNGMESSAGING].
+also see the discussion at \[RNGMESSAGING\].
<a id="srv-spec.txt-5.2"></a>