Boyd, Design and Analysis of Key Exchange Protocols via Secure Channel Identification, Advances in Cryptology—4th Int'l Conf. pp. 171-181 (Nov. 94). |
Matsutmoto, On Seeking Smart Public Key Distribution Systems, Trans. IECE of Japan, vol. E69, No. 2, pp. 99-106 (Feb. '86). |
Patrick Horster, Meta-el Gamal Signature Schemes, 1994 ACM, pp. 96-107. |
Patrick Horster, Meta-Message Recovery and..., Advances in Cryptology, ASIACRYPT '94, pp. 224-237. |
Kaisa Nyberg, Message Recovery for Signature..., Advances in Cryptology, ASIACRYPT '94 pp. 182-193. |
Bruce Schneier Whitfield Diffie, Authentication and Authenticated Key Exchanges, Designs, Codes, and Cryptology V2, N32 Jun. 1992, pp. 107-125. |
“Applied Cryptography,” 2nd Edition, pp. 496-522, John Wiley & Sons (1996). |