1. Joux, A., & Nguyen, K. (2003). Separating decision Diffie–Hellman from Diffie–Hellman in cryptographic groups. Cryptology ePrint Archive, Report-2002/03.
2. Libert, B., & Quisquater, J.-J. (2004). Efficient Signcryption with key privacy from gap Diffie–Hellman groups [EB/OL].
http://www.uclcrypto.org
.
3. Miller, V. (1985). Uses of elliptic curves in cryptography. In H. C.Williams (Ed.), Advances in cryptology-CRYPTO 85, proceedings, lecture notes in computer science (No. 218, pp. 417–426). Springer.
4. Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48(177), 203–209.
5. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Proceedings of Crypto’84 (pp. 47–53). Springer.