1. Lecture Notes in Computer Science;M. Bellare,1990
2. Lecture Notes in Computer Science;R. Berger,1985
3. Blum, M.: Three applications of oblivious transfer: 1. Coin flipping by telephone, 2. How to exchange secrets, 3. How to send certified electronic mail, Dept., EECS, University of California, Berkeley, Calif (1981)
4. Blum, M.: How to exchange (secret) keys. ACM Transaction on Computer System 1(2), 175–193 (1983)
5. Lecture Notes in Computer Science;E.F. Brickell,1987