| SecureWay Key Recovery Technology, http://www˜4.ibm.com/software/security/keyworks/library/whitepapers/keyrec.html, Jan. 27, 1997. |
| IBM SecureWat Key Recovery Technology, http://www˜4.ibm.com/software/security/keyworks/library/whitepapers/keyrec2.html, Jan. 27, 1997. |
| BIT, Lecture, Feb. 1996, vol. 28, No. 2. |
| “Fair Cryptosystems” by S. Micali, Aug. 11, 1994. |
| ISO/IEC 10118-2, “Information Technology-Security Techniques-Hash Functions: Part 2: Hash-Functions using an N-Bit Block Cipher Algorithm” (1994). |
| “The MD5 Message Digest Algorithm” by R. Rivest, IETF RFC 1321 (1992). |
| Koyama et al, Elliptical Curve Cryptosystems and Their Applications, IEICE Trans. INF & System, E75-D, pp. 50-57, Jan. 1992. |
| B. Schneier, Applied Crytography, 2e, John Wiley pp. 70-73, Oct. 1995. |
| IBM SecureWay Key Recovery Technology, http://www.ibm-com/security/html/prkeyrec.html, Jan. 27, 1997. |
| IBM Comparison to Alternatives, http://www˜4.ibm.com/software/security/keywords/library/whitepapers/keyrec3.html, Jan. 27, 1997. |
| A.Shamir, “How to Share a Secret”, In Communications of the ACM, vol. 22, No. 11, pp. 616-613, 1979. |
| T.P. Pedersen, “Distributed Provers with Applications to Undeniable Signatures”, In Proc. of Eurocrypt '91, Lecture Notes in Computer Science, LNCS 547, Springer Verlag, pp. 221-238, 1991. |
| T.P.Pedersen, “A Threshold Cryptosystem without a Trusted Party”, in Proc. of Eurocrypt '91, Lecture Notes in Computer Science, LNCS 547, Springer Verlag, pp. 522-526, 1991. |
| R. Gennaro, S. Jarecki, H. Krawczyk and T.Rabin, “Robust Threshold DSS Signatures”, In Proc. of Eurocrypt '96, Lecture Notes in Computer Science, LNCS 1070, Springer Verlag, pp. 354-371, 1996. |
| C.Park and K.Kurosawa, “New ElGamal Type Threshold Digital Signature Scheme”, IEICE Trans. Fundamentals, E79-A(1) :86-93, Jan. 1996. |
| K.Koblitz, “Algebraic Aspects of Cryptography”, Algorithms and Computation in Mathematics vol. 3, ACM 3, 1998. |