1. Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In Advances in Cryptology-ASIACRYPT 2003 (pp. 452–473). Berlin: Springer.
2. Duursma, I. M., & Kiyavash, N. (2005). The vector decomposition problem for elliptic and hyperelliptic curves. IACR Cryptology ePrint Archive, 2005, 31.
3. Duursma, I. M., & Park, S. K. (2006). Elgamal type signature schemes for n-dimensional vector spaces. IACR Cryptology ePrint Archive, 2006, 312.
4. Galbraith, S. D., & Verheul, E. R. (2008). An analysis of the vector decomposition problem. In Public Key Cryptography–PKC 2008 (pp. 308–327). Berlin: Springer.
5. Kumar, M., & Praveen, I. (2015). A fully simultable oblivious transfer scheme using vector decomposition. In Intelligent computing, communication and devices (pp. 131–137). Berlin: Springer.