1. Chaum, D., “Security Without Identification: Transaction Systems to make Big Brother Obsolete,” Communications of the ACM, Vol. 22, No. 10, October 1985, pp. 1030–1044.
2. Technical Report;G.I. “. Davida,1982
3. de Jonge, W., “Attacks on RSA Signatures and Countermeasures,” in Security and Privacy in Information Systems: some technical aspects, Ph.D. Thesis, June 1985.
4. DeMillo, R.A. and Merritt, M.J., “Chosen Signature Cryptanalysis of Public Key Cryptosystems,” Technical Memorandum, School of Information and Computer Science, Georgia Institute of Technology, Atlanta GA, October 25, 1982.
5. Denning, D.E., “The Many-Time Pad: Theme and Variations” Proceedings of the 1983 Symposium on Security and Privacy, April 25–27, 1983; the relevant part also appeared as “Digital Signatures with RSA and Other Public-Key Cryptosystems,” Communications of the ACM, Vol. 27, No. 4, April 1984, pp. 388–392.