1. Simon Singh. The Code Book: The Secrets Behind Codebreaking, 2003.
2. W. Diffie and M. Hellman. 2006, New directions in cryptography. IEEE Trans. Information Theory. 22, 6 (September 2006), 644–654. DOI: https://doi.org/10.1109/TIT.1976.1055638.
3. R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications ACM, vol. 21, no. 2, pp. 120–126, 1978.
4. ElGamal T., A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakley G.R., Chaum D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol. 196. Springer, Berlin, Heidelberg.
5. ISO/IEC 9796-2:2010 – Information Technology – Security Techniques – Digital Signature schemes giving message recovery. Available online: https://www.iso.org/standard/54788.html.