1. Naccache, D., Stern, J.: A new public-key cryptosystem. In: Fumy, W. (ed.) Advances in Cryptology—EUROCRYPT’97, Lecture Notes in Computer Science, vol. 1233, pp. 27–36. Springer, Heidelberg (1997)
2. Adleman, L.M.: On breaking the iterated Merkle–Hellman public-key cryptosystem. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology—CRYPTO’82, pp. 303–308. Plenum Press, New York (1982)
3. Brickell, E.F.: Breaking iterated Knapsacks. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology—CRYPTO’84, Lecture Notes in Computer Science, vol. 196, pp. 342–358. Springer, Heidelberg (1984)
4. Joux, A., Stern, J.: Cryptanalysis of another Knapsack cryptosystem. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) Advances in Cryptology—ASIACRYPT’91, Lecture Notes in Computer Science, vol. 739, pp. 470–476. Springer, Heidelberg (1993)
5. Chee, Y.M., Joux, A., Stern, J.: The cryptoanalysis of a new public-key cryptosystem based on modular Knapsacks. In: Feigenbaum, J. (ed.) Advances in Cryptology—CRYPTO’91, Lecture Notes in Computer Science, vol. 576, pp. 204–212. Springer, Heidelberg (1992)