| Menezes, Hand book of applied cryptography.1997, CRC press LLC,, pp. 412-414 and 450-451.* |
| Schneier, Applied cryptography 1996, Katherine Schowalter, second edition, pp. 450-451 and 508-510.* |
| L. C. Guillou et al., A Practical Zero-Knowledge Protocol Fitted To Security Microprocessor Minimizing Both Transmission And Memory, pp. 123-128, date unknown. |
| A. Fiat et al., How To Prove Yourself: Practical Solutions to Identification and Signature Problems, pp. 186-194, date unknown. |
| L. C. Guillou et al., A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge, pp. 216-231, date unknown. |
| D. Chaum, Online Cash Checks, pp. 288-293, date unknown. |