D. E. R. Denning, Cryptography and Data Security; (Addison-Wesley; Reading, Mass., U.S.A.; 1983); pp. 7-16. |
R. E. Lennon et al., Transaction Response Message Authentication (Public Key and Des), KI881-197, vol. 26, No. 8 Jan. 1984. |
R. E. Lennon et al., Public-Key Enciphering/Deciphering Transformations Using a Conventional Algorithm, vol. 25, No. 3A, pp. 1241-1249, Aug. 1982. |
W. Alexi et al., RSA and Rabin Functions: Certain Parts are as Hard as the Whole, 1988 Society for Industrial and Applied Mathematics, Siam J. Comput, vol. 17, No. 2, Apr. 1988, pp. 194-209. |
M. Bellare et al., How to Sign Given Any Trapdoor Function, ACM-0-89791-264-0/88 0005/0032, pp. 32-42, 1988. (Extended Abstract). |
M. Blaum et al., Noninteractive Zero-Knowledge, 1991 Society for Industrial Applied Math., Siam J. Comput. vol. 20, No. 6, pp. 1084-1118, Dec. 1991. |
M. Blaum et al., Non-Interactive Zero-Knowledge and Its Application (Extended Abstract), ACM-0-89791-264-0/88/0005/0103, 1988. |
M. Blaum, et al., An Efficient Probabilistic Public-Key Encryption Scheme Which Hides all Partial Information, Proc. of Crypto 84, pp. 289-299. |
B. Chor et al., Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults, IEEE 0272-5428/85/0000/0383, 1985. (Extended Abstract). |
B. Chor et al., Achieving Independence in Logarithmic Number of Rounds, ACM 0-89791-239-X/87/0008/0260, pp. 260-264, 1987. |
Y. Desmedt et al., Special Uses and Abuses of the Fiat-Shamir Passport Protocol, (Extended Abstract) Crypto pp. 21-39, 1987. |
U. Feige et al., Witness Indistinguishable and Witness Hiding Protocols, AMC 089791-361-2/90/0005/0416, pp. 416-426, 1990. |
U. Feige et al., Zero-Knowledge Proofs of Identity, J. Cryptology, pp. 77-94, 1988. |
U. Feige et al., Multiple Non-Interactive Zero Knowledge Proofs Based on a single Random String, IEEE CH2925-6/90/0000/0308, FOCS 1990. |
O. Goldreich et al., A Hard-Cord Predicate for all One-Way Functions, ACM 0-89791-307-8/39/0005/0025, STOC 1989. |
S. Goldwasser et al., Probabilistic Encryption, J. of Computer & System Sciences 28, pp. 270-299, 1984. |
S. Goldwasser et al., A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, Siam J. Comput, vol. 17, No. 2, pp. 281-308, Apr. 1988. |
L. A. Levin, One way Functions and Pseudorandom Generators, Combinatorica 7 (4) pp. 357-363, 1987. |
S. Micali et al., The Notion of Security for Probabilistic Cryptosystems, SIAM J. Comput. vol. 17., No. 2 pp. 412-426, 1988. |
M. Naor et al., Universal One-Way Hash Functions and Their Cryptographic applications, ACM 0-89791-307-8/89/0005/0033, pp. 33-43, STOC 1989. |
M. Noar et al., Public-key Cryptosystems Provably Secure Against Chosen Ciphertext Attacks, (Extended Abstract) ACM 089791-361-2/90/0005/0427, pp. 427-437, STOC 1990. |
J. Rompel, et al., One-Way Functions are Necessary and Sufficient for Secure Signatures, ACM 089791-361-2/90/0005/0387, pp. 387-394. |
M. N. Wegman et al., New Hash Functions and Their Use in Authentication and Set Equality, J. of Computer & Sys. Sciences 22, pp. 265-279, 1981. |
Diffie et al., New Directions in Cryptography, IEEE Transactions on Info. Theory, vol. IT-22, No. 6, pp. 644-654, Nov. 1976. |