1. Lang, S. (1973). Elliptic functions. Reading: Addison-Wesley.
2. ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4), 469–472.
3. Joux, A. (2000). A one-round protocol for tripartite Diffie-Hellman. In Proceedings of the 4th international algorithmic number theory symposium, Leider, the Netherlands (pp. 385–394).
4. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Trans Inf Theory, IT-22, 6, 644–654.
5. Boneh, D., & Franklin, M. Identity based encryption from the Weil pairing. SIAM Journal of Computing.