1. Lecture Notes in Computer Science;A. Barth,2006
2. Lecture Notes in Computer Science;B. Barak,2001
3. Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. Cryptology ePrint Archive, Report 2013/401 (2013)
4. Barak, B., Garg, S., Kalai, Y.T., Paneth, O., Sahai, A.: Protecting obfuscation against algebraic attacks. Cryptology ePrint Archive, Report 2013/631 (2013),
http://eprint.iacr.org/
5. Lecture Notes in Computer Science;D. Boneh,2005