1. Agrawal, M., Kayal, N., & Saxena, N. (2004). PRIMES in P. Annals of Mathematics, 160(2), 781–793.
2. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2001). Section 31.8: Primality testing, introduction to algorithms (2nd ed., pp. 889–890). MIT Press, McGraw-Hill. ISBN 0-262-03293-7.
3. Desmedt, Y., & Frankel, Y. (1989). Threshold cryptosystems. In Proceedings of the advances in cryptology (Crypto ’89) (pp. 307–315).
4. Desmedt, Y., & Frankel, Y. (1991). Shared generation of authenticators and signatures (extended abstract). In Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (pp. 457–469).
5. ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions of Information Theory, 31(4), 469–472.