Bruce Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C 1996, John Wiley & Sons, Inc., Second Edition, pp. 502-511.* |
Alfred J. Menezez et al., Handbook of Applied Cryptography 1997, CRC Press LLC, pp. 401-409.* |
Oded Goldreich and Eyal Kushilevitz, A perfect zero-knowledge proof for a problem equivalent to discrete logarithm, Advances in Cryptography—Crypto'88, vol. 403 of Lecture Notes in Computer Science, pp. 57-70, Aug. 21-25, 1988.* |
Louis Claude Guillou and Jean-Jacques Quisquater, A “Paradoxical” identity-based signature scheme resulting from zero-knowledge , Advances in Cryptography—Crypto'88, vol. 403 of Lecture Notes in Computer Science, pp. 216-231, Aug. 1988.* |
L. Goillou et al., “A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory”, Advances in Cryptology EUROCRYPT '87, C.G. Guenther (ed.), Springer-Verlag, pp. 123-128. |
D. Chaum, “Online Cash Checks”, Advances in Cryptology EUROCRYPT '89, J.J. Quisquater, J. Vandewalle (ed.), Springer-Verlag, pp. 288-293. |
A. Fiat et al., “How to Prove Yourself: Practical Solutions to Identification and Signature Problems”, Advances in Cryptology, CRYPTO '86, A.M. Odlyzko (ed.), Springer-Verlag, pp. 186-194. |
L. Guillou et al., “A “Paradoxical” Identity-Based Signature Scheme Resulting from Zero-Knowledge”, Advances in Cryptology CRYPTO '88, S. Goldwasser (ed.), Springer-Verlag, pp. 216-231. |