1. Lin, Cryptanalysis of an efficient deniable authentication protocol based on generalized ElGamal signature scheme;Liu C.;International Journal of Network Security,2011
2. Robust Deniable Authentication Protocol
3. Cryptanalysis of an improvement of robust deniable authentication protocol;Mahshid;ICEEC,2016
4. F. Li , T. Takagi, Cryptanalysis and improvement of robust deniable authentication protocol , Wireless Pres Commun , ( 2013 ), pp. 1391 - 1398 . F. Li, T. Takagi, Cryptanalysis and improvement of robust deniable authentication protocol, Wireless Pres Commun, (2013), pp. 1391-1398.
5. C. Dwork , M. Naor , A. Sahai , Concurrent zero-knowledge , in: Proceedings of 30th ACM STOC'98 , ( 1998 ), pp. 409– 418 . C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, in: Proceedings of 30th ACM STOC'98, (1998), pp. 409–418.