1. A Graduate Course in Applied Cryptography. Version 0.5
http://toc.cryptobook.us/book.pdf
2. Efficient signature generation by smart cards
3. Authenticated Key Exchange and Key Encapsulation in the Standard Model;Okamoto,2007
4. Wallet Databases with Observers;Chaum,1993
5. Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes;Beullens,2020