1. Lecture Notes in Computer Science;J Algesheimer,2002
2. Lecture Notes in Computer Science;N Barić,1997
3. Bichsel, P., Binding, C., Camenisch, J., Groß, T., Heydt-Benjamin, T., Sommer, D., Zaverucha, G.: Cryptographic protocols of the identity mixer library. Research Report RZ 3730, IBM Research Division (2009)
4. Lecture Notes in Computer Science;F Boudot,2000
5. Brillhart, J., Lehmer, D.H., Selfridge, J.L.: New primality criteria and factorizations of $$2\hat{\,\,}\{\text{ m }\}$$$$\pm $$1. Math. Comput. 29(130), 620–647 (1975)