1. Abstract algebra (Vol. 3);Dummit,2004
2. The kernel function and conformal mapping (Vol. 5);Bergman,1970
3. Using encryption for authentication in large networks of computers;Needham;Commun ACM,1978
4. Sharma I. Fully homomorphic encryption scheme with symmetric keys. 2013. arXiv:1310.2452.
5. Public-key cryptosystems based on composite degree residuosity classes;Paillier,1999