1. Awasthi, A., Lal, S.: Proxy Blind Signature Scheme. Transaction on Cryptology 2(1), 5–11 (2005)
2. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post Quantum Cryptography, Department of Computer Science, University of Illinois, Chicago. Springer, Heidelberg (2009)
3. Boldyreva, A., Palacio, A., Warinschi, B.: Secure Proxy Signature Schemes for Delegation of Signing Rights. Journal of Cryptology 25(1), 57–115 (2012)
4. Bouillaguet, C., Faugère, J., Fouque, P., Perret, L.: Differential Algorithms for the Isomorphism of Polynomials Problem (2009) (manuscript),
http://eprint.iacr.org/2009/583.pdf
5. Lecture Notes in Computer Science;S. Bulygin,2010