1. Secret handshakes with dynamic and fuzzy matching.;Ateniese,2007
2. Secret handshakes from pairing-based key agreements;Balfanz,2003
3. Secret handshakes from ca-oblivious encryption;Castelluccia,2004
4. Handbook of Elliptic and Hyperelliptic Curve Cryptography;Cohen,2005
5. Linear-complexity private set intersection protocols secure in malicious model;De Cristofaro,2010