1. Lecture Notes in Computer Science;B Auerbach,2018
2. Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signatures: Definitions, constructions and applications. Cryptology ePrint Archive, Report 2015/517 (2015). http://eprint.iacr.org/2015/517
3. Baghery, K.: Subversion-resistant commitment schemes: definitions and constructions. Cryptology ePrint Archive, Report 2019/1065 (2019). https://eprint.iacr.org/2019/1065
4. Lecture Notes in Computer Science;K Baghery,2019
5. Ball, J., Borger, J., Greenwald, G., et al.: Revealed: how US and UK spy agencies defeat internet privacy and security. Guard. 6, 2–8 (2013)