1. Denning, D. E. (1982): Cryptography and Data Security, Addison-Wesley, Mass., 1982.
2. Diffie, W. and Hellman, M. (1976): “New directions in cryptography,” IEEE Trans. Information Theory, Vol. IT-22, 1976, pp. 472–492.
3. Ehrsam, W. F., Matyas, S. M., Meyer, C. H., and Tuchman, W. L. (1978): “A cryptographic key management scheme for implementing the Data Encryption Standard,” IBM Systems Journal, Vol. 17, No. 2, 1978, pp. 106–125.
4. ElGamal, T. (1985): “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Information Theory, Vol. IT-31, No. 4, July 1985, pp. 469–472.
5. Fiat, A. and Shamir, A. (1986): “How to prove yourself: practical solutions to identification and signature problems,” Proceedings of CRYPTO'86, Lecture Notes in Computer Science, Springer-Verlag, 1987, pp. 186–194.