Chaum, "Design Concept For Tamper Responding System", Proc. of Crypto 82, Plenum Press, 1983. |
Chaum et al., "A Secure And Privacy Protecting Protocol For Transmitting Personal Information Between Organizations", Advances in Crytology: Proceedings of Crypto 86, Springer Verlag Press, 1987. |
Elgamal, "A Public Key Cryptosystem And Signature Scheme Based On Discrete Logarithms", Advances in Cryptology: Proceedings of Crypto 84, Springer Verlag Press, 1985. |
Chaum et al., "An Improved Protocol For Demonstrating Possession Of Discrete Logarithms And Some Generalations", Advances in Cryptology: Proceedings of Eurocrypt 87, Springer Verlag Press, 1988. |
Rivest et al., "A Method For Obtaining Digital Signatures And Public-Key Cryptosystems", Communications of the ACM, Feb. 1978, pp. 120-126. |
Rabin, "Digitalized Signatures And Public-Key Functions As Intractable As Factorization", MIT Technical Report MIT/LCS/TR-212, Jan. 1979. |
Peralta et al., "A Simple And Secure Way To Show The Validity Of Your Public Key", Proceedings of Crypto 87, Springer Verlag Press, 1988. |