1. International Organization for Standardization, Genève, Switzerland. ISO/IEC 18033-2:2006, Information technology — Security techniques — Encryption Algorithms — Part 2: Asymmetric Ciphers, Final Committee Draft (2006),
http://shoup.net/iso/
2. Cryptography Research and Evaluation Committees (CRYPTREC). Specifications of ciphers in the Candidate Recommended Ciphers List (March, 2013),
http://www.cryptrec.go.jp/english/method.html
3. Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: A new framework for hybrid encryption. J. Cryptology 21(1), 97–130 (2008)
4. American National Standards Institute. ANSI X9.44-2007: Key Establishment Using Integer Factorization Cryptography (2007)
5. Anada, H., Arita, S.: Identification schemes from key encapsulation mechanisms. IEICE Transactions 95-A(7), 1136–1155 (2012)