1. Abadi, M., J. Feigenbaum, and J. Kilian, “On hiding information from an oracle”, Journal of Computer and System Sciences, Vol. 39, 1989, pp. 21–50.
2. Angluin, D. and D. Lichtenstein, “Provable security of cryptosystems: A survey”, Technical Report Yaleu/dcs/tr-288, Department of Computer Science, Yale University, 1983.
3. Bellare, M., S. Micali, and R. Ostrovsky, “Perfect zero-knowledge in constant rounds”, Proceedings of the 22nd ACM Symposium on Theory of Computing, 1990, pp. 482–493.
4. Bennett, C.H. and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, December 1984, pp. 175–179.
5. Blum, M. and S. Kannan, “Designing programs that check their work”, Proceedings of the 21st ACM Symposium on Theory of Computing, 1989, pp. 86–97.