1. Apon D., Huang Y., Katz J., Malozemoff A.: Implementing cryptographic program obfuscation, Crypto 2014 rump session (2014). http://eprint.iacr.org/2014/779 .
2. Barak B., Goldreich O., Impagliazzo R., Rudich S., Sahai A., Vadhan S., Yang K.: On the (im)possibility of obfuscating programs. J. ACM 59, 6 (2012).
3. Barwood G.: Digital signatures using elliptic curves (1997). http://groups.google.com/group/sci.crypt/msg/b28aba37180dd6c6 .
4. Beame P.W., Cook S.A., Hoover H.J.: Log depth circuits for division and related problems. SIAM J. Comput. 15, 994–1003 (1986).
5. Bellare M.: Caught in between theory and practice. In: Crypto 2014 IACR Distinguished Lecture (2014). https://www.youtube.com/watch?v=SPVWSG7-i_E .