1. Diffie, W. and Hellman, M.E.: “New directions in cryptography,” IEEE Trans. on Information Theory, Vol.IT-22, No.6, pp.644–654 (Nov. 1976).
2. Rivest, R.L., Shamir, A. and Adleman, L.: “A method of obtaining digital signatures and public key cryptosystems,” Comm. ACM, Vol.21, No.2, pp.120–126 (Feb.1978).
3. McEliece,R.: “A public key cryptosystem based on algebraic coding theory,” DSN Progress Rep.42–44, Jet Propulsion Lab. Calif.Inst.of Tech. (Jan.,Feb. 1978).
4. Matsumoto,T. and Imai,H.: “A new algorithm for public-key crypto-system,” Paper of Technical Group, TGIT82-24, IECE Japan (Aug. 1982) (in Japanese).
5. Matsumoto,T. and Imai,H.: “A public-key cryptosystem based on polynomials over finite fields of characteristic 2,” Proc.of the 5th Symposium on Information Theory and its Applications, pp.372–379 (Oct. 1982) (in Japanese).