1. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
2. Vanstone, S.: Responses to NIST’s proposal. Commun. ACM 35(7) (1992)
3. Shor, P. W., Goldwasser, S.: (ed.) Algorithms for quantum computation: discrete logarithms and factoring. In: Goldwasser, S. (ed.) Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134 (1994)
4. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-quantum Cryptography, 1st edn. Springer, Berlin, Heidelberg (2009)
5. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Prog. Rep. 42–44, 114–116 (1978)