1. Diffie, W., & Hellman, a M. E. (1976). New directions in cryptography. IEEE Transaction on Information Theory, 22(6), 644–654.
2. ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.
3. Schnorr, C. P. (1991). Efficient signature generation by smart cards. Journal of Cryptology, 4, 161–174.
4. Lenstra, A. K. (1997). Using cyclotomic polynomials to constract efficient discrete logarithm cryptosystems over finite fields. In V. Varadharajan, J. Pieprzyk, & Y. Mu (Eds.), Information Security and Privacy - ACISP 1997.LNCS 1270, (pp. 127–138). Berline, Heidelberg: Springer.
5. Brouwer, A. E., Pellikaan, R., & Verheul, E. R. (1999). Doing more with fewer bits. In K. Y. Lam, E. Okamoto, & C. Xing (Eds.), ASIACRYPT 1999.LNCS 1716 (pp. 321–332). Berlin Heidelberg: Springer.