1. Lecture Notes in Computer Science;M. Ajtai,1999
2. Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: STACS 2009. Dagstuhl Seminar Proceedings, vol. 09001, pp. 75–86. Schloss Dagstuhl (2009),
http://drops.dagstuhl.de/portals/STACS09/
3. Lecture Notes in Computer Science;M. Bellare,2000
4. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: IEEE Symposium on Security & Privacy, pp. 72–84. IEEE, Los Alamitos (1992)
5. Lecture Notes in Computer Science;V. Boyko,2000