1. (1)H. Imai, “Cryptographic approach to information security,” Proceedings of The 31st International Symposium, Challenges in Secure Broadband Communication of the 21st Century, The National Academy of Sciences, pp.37–68, Korea, Oct. 2003.
2. (2)萩谷昌己, “数理的技法によるセキュリティプロトコルの検証,” 日本応用数理学会 数理的技法による情報セキュリティ研究部会, 第2回研究集会資料, Dec. 2006, http://hagi.is.s.u-tokyo.ac.jp/jsiam-fais/doc/20061222-hagiya.pdf
3. (3)W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644–654, Nov, 1976.
4. (4)R.L. Rivest, A.Shamir, and L.Adelman, “A method for obtaining digital signature and public-key cryptsystems,” MIT Laboratory for Computer Science; Technical Memo LCS/TM82, April 1977.
5. (5)D. Bleichenbacher, “Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1,” Proc. CRYPTO '98, pp. 1–12, Springer-Verlag, Aug, 1998.