1. Adleman, L., Huang, M., Kompella, K.: Efficient checkers for number-theoretic computations. Inf. Comput. 121(1), 93–102 (1995)
2. Anshel, I., Atkins, D., Goldfeld, D., Gunnels, P. E.: Post Quantum Group theoretic Cryptography, in https://www.securerf.com/wp-content/uploads/2017/01/SecureRF-GTDH-Quantum-Resistant-12-16.pdf, vol. 10, pp. 1–11 (2016)
3. Atallah, M., Pantazopoulos, K.N., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Adv. Comput. 54(6), 215–272 (2001)
4. Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: Proceedings of 5th ACM ASIACCS, pp. 48–59, ACM (2010)
5. Bellare, M., Garay, J., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Proceedings of EUROCRYPT 1998, LNCS 1403, pp. 236–250. Springer (1998)