1. R.A. Demillo, G.I. Davida, D.P. Dobkin, M.A. Harrison, and R.J. Lipton, On the Safety of Cryptosystems, Applied Cryptology, Cryptographic Protocols and Computer Security Models, AMS Short Courses Lecture Notes, Vol. 29, Providence, 1983.
2. Shafi Goldwasser, Silvio Micali, R.L. Rivest, A “paradoxical” solution to the signature problem, Proc. 25th IEEE Symposium on Foundations of Computer Science, to appear.
3. D.H. Lehmer, Computer technology applied to the theory of numbers, Studies in Number Theory, Math. Assoc. of America, 1969, Theorem 5, p. 133.
4. H.W. Lenstra, jr., Euclidean number fields I., Math. Intelligencer 2 (1979/80), 6–15.
5. M.O. Rabin, Digitized signatures and public-key functions as intractable as factorization, M.I.T. Lab. for Computer Science, Tech. Rep. LCS/TR212, 1979.