1. H. Tolgay. Cryptography II and secure communication. https://www.hakantolgay.com/files/Cryptography_Day_II.pptx
2. Stinson, D. R. (2013). Cryptography theory and practice, discrete mathematics and its applications. Chapman & Hall/CRC, Taylor & Francis Group.
3. Buchmann, J. A. (2004). Introduction to cryptography. Undergraduate texts in mathematics. New York: Springer.
4. Pointcheval, D., & Stern, J. (1996). Security proofs for signature schemes. In U. Maurer (Ed.), Advances in Cryptology - EUROCRYPT 1996.LNCS 1070, (pp. 387–398). Berlin, Heidelberg: Springer.
5. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystem. Communications of ACM, 21(2), 120–126.