- [1]
- R. Rivest, A. Shamir, L. Adleman:
A method for obtaining digital signatures and
public key cryptosystems, Communications of the ACM, Vol. 21, N. 2, 1978, S. 120-126.
- [2]
- David Chaum: Security without Identification:
Transaction Systems to make Big
Brother Obsolete,
Communications of the ACM, Vol. 28, N. 10, 1985, pp. 1030-1044;
Revised version (in German), Informatik-Spektrum, vol. 10, 1987,
pp. 262-277 1987.