1. ‘Identity-based chameleon hash and applications’, Financial Cryptography;Ateniese,2004
2. ‘On the Key Exposure Problem in Chameleon Hashes’, the Fourth Conference on Security in Communication Networks (SCN’04), LNCS;Ateniese,2004
3. ‘Short signatures without random oracles’;Boneh,2004
4. Chen, X., Zhang, F., Kim, K.: ‘Chameleon Hashing without Key Exposure’. ISC04, Sep. 27-29, Palo Alto, USA.
5. ‘Chameleon signatures’;Krawczyk,2000