1. ‘New Directions in Cryptography’, IEEE Trans. on Information Theory, IT-22,6(Nov. 1976),644–654
2. ‘A method for obtaining digital signatures and public-key cryptosystems.’ CACM 21,2, Feb. 1978 120–126
3. ‘Secrecy, Authentication, and Public Key Systems’, Ralph C. Merkle, UMI Research Press 1982.
4. ‘How to Prove Yourself: Practical Solutions to Identification and Signature Problems’, Amos Fiat and Adi Shamir, 1986.
5. ‘Making the Digital Signature Legal — and Safeguarded’, S.M. Lipton, S.M. Matyas, Data Communications, Feb. 1978 41–52.