Chaum, D. “Zero-Knowledge Undeniable Signatures.” Proceedings of Eurocrypt '90. 1990.* |
Voydock, V. and S. Kent. “Security Mechanisms in High-Level Network Protocols.” Communications of the ACM. 1983.* |
Mulqueen, John T. Premenos Goes After IPO Gold. CommunicationsWeek, n575, p 93(2). Sep. 18, 1995. Reproduced from Dialog Web ™.* |
Krawczyk, H. and T. Rabin. “Chameleon Hashing and Signatures.” Internet—http://www.research.ibm.com/security/projects.html, Oct. 1997.* |
Michael O. Rabin, “Digitalized Signatures”, Hebrew University of Jerusalem, Massachusetts Institute of Technology, Jul. 1976, p. 155-166. |
R. L. Rivest, et al., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120-124. |
David Chaum, “Undeniable Signatures”, Centre for Mathematics and Computer Science, pp. 212-214. |