1. E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, Recommendation for Key Management – Part 1: General, NIST Special Publication 800, 2007, p. 57 (Revised).
2. R. Dutta, R. Barua, P. Sarkar, Pairing-based cryptographic protocols: a survey, Cryptology (ePrint Archive, Report 64).
3. Identity-based encryption from the Weil pairing;Boneh;SIAM Journal on Computing,2003
4. P. Barreto, H. Kim, B. Lynn, M. Scott, Efficient algorithms for pairing-based cryptosystems, in: 22nd Annual International Cryptology Conference (CRYPTO’02), Lecture Notes in Computer Science, vol. 2442, 2002, pp. 354–368.
5. M. Scott, N. Costigan, W. Abdulwahab, Implementing cryptographic pairings on smartcards, in: Cryptographic Hardware and Embedded Systems—CHES 2006, 2006, pp. 134–147.