1. Blum, R., “How to Exchange (Secret Keys)” ERL Technical Memo UCB/ERL M81/90.
2. Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Trans. Inform. Theory, Vol. IT-22, Nov. 1976.
3. Miller, G.L., “Riemann’s Hypothesis and Tests for Primality,” Proc. Seventh Annual ACM Symp. on the Theory of Computing. Albuquerque, New Mexico, May 1975, pp. 234–239; extended vers. available as Res. Rep. CS-75–27, Dept. of Computer Science, University of Waterloo, Waterloo, Ont., Canada, Oct. 1975.
4. Rivest, R.L., Shamir, A. and Adleman, L.M., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” CACM 21, pp. 120–126, February 1978.
5. Shamir, A., “How to Share a Secret,” CACM 22, Number 11, p. 612, November 1979.