1. Lect Notes Comput Sci;A. Shamir,1985
2. R. Blom, “Non-public Key Distribution,” Proc. of CRYPTO’82, Plenum Press, pp.231–236, (1983).
3. Lect Notes Comput Sci;T. Matsumoto,1987
4. L. Gong and D. J. Wheeler, “A Matrix Key-Distribution Scheme,” Journal of Cryptology, vol. 2, pp.51–59, Springer, (1993).
5. Lect Notes Comput Sci;W. A. Jackson,1994