1. Bennett, C.H., and Brassard, G. (1984, January 9–12). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India.
2. Brassard, G., Crépeau, C., Jozsa, R., and Langlois, D. (1993, January 3–5). A quantum bit commitment scheme provably unbreakable by both parties. Proceedings of the 34th Annual IEEE Symposium on Foundations of Computer Science, Palo Alto, CA, USA.
3. Rabin, M.O. (1981). How to Exchange Secrets by Oblivious Transfer, Aiken Computation Laboratory, Harvard University. Available online: http://eprint.iacr.org/2005/187.pdf.
4. Chaum, D., Rivest, R.L., and Sherman, A.T. (1982). Advances in Cryptology, Proceedings of the Crypto ’82, Santa Barbara, CA, USA, 23–25 August 1982, Plenum.
5. Kilian, J. (1988, January 2–4). Founding cryptography on oblivious transfer. Proceedings of the 1988 ACM Annual Symposium on Theory of Computing, Chicago, IL, USA.