1. Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
2. Delignat-Lavaud A. Fournet C. Vaswani K. Clebsch S. Riechert M. Costa M. Russinovich M. 2023. Why should I trust your code? Communications of the ACM 67 (1) 68?76; https://dl.acm.org/doi/10.1145/3624578.
3. Ernstberger, J., Chaliasos, S., Kadianakis, G., Steinhorst, S., Jovanovic, P., Gervais, A., Livshits, B., Orrù, M. 2023. zk-Bench: a toolset for comparative evaluation and performance benchmarking of SNARKs; https://eprint.iacr.org/2023/1503.pdf.
4. Fiat, A., Shamir, A. 1986. How to prove yourself: practical solutions to identification and signature problems. In Proceedings of Advances in Cryptology (CRYPTO), 186?194; https://dl.acm.org/doi/10.5555/36664.36676.
5. Goldreich, O. 2001. Foundations of Cryptography, Volume 1: Basic Tools. Cambridge University Press.