1. M.N. Wegman and J.L. Carter, New Hash Functions and Their Use in Authentication and set Equality, JCSS, 22: 265 (1981).
2. W. Diffie and M.E. Hellman, New Directions in Cryptography, IEEE Trans. Info. Th., IT-22: 644 (1976).
3. R.L. Rivest, A. Shamir and L. Adleman, On Digital Signature and Public-Key Cryptosystems, CACM, 21: 120 (1978).
4. A. Shamir, A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, in: “Proc. of 23rd FOCS Symposium, Chicago,” IEEE, New York (1982).
5. L. Adleman, On Breaking the Iterated Knapsack Public-Key Cryptosystem, presented at: “AMS Workshop on Probabilistic Computational Com- plexity, Durham,” A. Meyer, chair. (1982).