1. Paulo S. L. M. Barreto and Michael Naehrig . 2006 . Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography. Springer Berlin Heidelberg , Berlin, Heidelberg, 319–331. https://doi.org/10.1007/11693383_22 10.1007/11693383_22 Paulo S. L. M. Barreto and Michael Naehrig. 2006. Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography. Springer Berlin Heidelberg, Berlin, Heidelberg, 319–331. https://doi.org/10.1007/11693383_22
2. Jens Bender , Marc Fischlin , and Dennis Kügler . 2009. Security Analysis of the PACE Key-Agreement Protocol . In Information Security . Springer Berlin Heidelberg , Berlin, Heidelberg , 33–48. https://doi.org/10.1007/978-3-642-04474-8_3 10.1007/978-3-642-04474-8_3 Jens Bender, Marc Fischlin, and Dennis Kügler. 2009. Security Analysis of the PACE Key-Agreement Protocol. In Information Security. Springer Berlin Heidelberg, Berlin, Heidelberg, 33–48. https://doi.org/10.1007/978-3-642-04474-8_3
3. Anonymous credentials on a standard java card
4. Jan Camenisch , Manu Drijvers , Petr Dzurenda , and Jan Hajny . 2019. Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards . In ICT Systems Security and Privacy Protection . Springer International Publishing , Cham , 286–298. https://doi.org/10.1007/978-3-030-22312-0_20 10.1007/978-3-030-22312-0_20 Jan Camenisch, Manu Drijvers, Petr Dzurenda, and Jan Hajny. 2019. Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. In ICT Systems Security and Privacy Protection. Springer International Publishing, Cham, 286–298. https://doi.org/10.1007/978-3-030-22312-0_20
5. Anonymous Credentials with Practical Revocation using Elliptic Curves