IEEE Transactions on Information Theory vol. IT-26 No. 3 May 1980, “On the Security of the Merkle-Hellman Cryptography Scheme”, Adi Shamir Richard E. Zippel.* |
The Handbook of Applied Cryptography, pp. 300-304, Alfred J. Menezes 1996.* |
Akira Hayashi, “Remarks on the Lagarias-Odlyzko Method”, Kanazawa Institute of Technology, Ishikawa-ken, Japan, pp. 1013-1016, ABS only. |
Masahiro Yagisawa, “A Public-Key Cryptosystem Based on Diophantine Equation” vol. 31, No. 12, pp. 1852-1858, ABS. |
Hideo Shimizu, “On the Security of Kasahara-Murakami Public-Key Cryptosystem” Yokohama Research Center, Telecommunications Advancement Organization of Japan, Yokohama, Japan, pp. 29-35, ABS only. |
Sakai, et al., “Notes on Product-Sum Type Public Key Cryptosystem” The Institute of Electronics, Information and Communication Engineers, Technical Report of IEICE, pp. 61-66, ABS only. |