1. New directions in cryptography;Diffie;IEEE Transactions on Information Theory,1976
2. ISO/IEC 13888-1, Information technology—Security techniques—Non-repudiation—Part 1: General (1997).
3. ISO/IEC 13888-2, Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques (1998).
4. ISO/IEC 13888-3, Information technology—Security techniques—Non-repudiation—Part 3: Mechanisms using asymmetric techniques (1997).
5. How to exchange half a bit;Tedrick,1983-1984