Menezes et al. Handbook of Applied Cryptography, CRC Press, Oct. 17, 1996, pp. 454-459.* |
Schneier, Bruce, “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Oct. 18, 1995, pp. 496-498.* |
Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. Oct. 1995. pp. 429-459. |
Horster et al. Meta-ElGamal signature schemes. University of Technology Chemnitz-Zwickau. Dept. of Computer Science. Theoretical Computer Science and Information Security. May 1994. pp. 1-17. |
“Telegraph Encryption Method”; Apr. 30, 1953, vol. 7, No. 4, p. 461. |