1. Frymann, N., Gardham, D., Kiefer, F., Lundberg, E., Manulis, M., Nilsson, D.: Asynchronous remote key generation: an analysis of Yubico’s proposal for W3C WebAuthn. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, pp. 939–954. Association for Computing Machinery, New York (2020)
2. Frymann, N., Gardham, D., Manulis, M.: Asynchronous remote key generation for post-quantum cryptosystems from lattices. Cryptology ePrint Archive, Paper 2023/419 (2023). https://eprint.iacr.org/2023/419
3. Balfanz, D., et al.: Web authentication: an API for accessing public key credentials level 1. Technical report (2019)
4. Todd, P.: Stealth addresses (2014). https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2014-January/004020.html
5. van Saberhagen, N.: Cryptonote v2.0 (2013). https://cryptonote.org/whitepaper.pdf