REFERENCES
- Adam Young & Moti Yung, Bandwidth-Optimal Kleptographic Attacks, pp 235–250, Cryptographic Hardware and Embedded Systems—CHES 2001, (Eds. Cetin K Koc, David Naccache, Christof Paar), Springer.
- Mihir Bellare, Marc Fischlin, Shafi Goldwasser & Silvio Micali, Identification Protocols Secure against Reset Attacks, pp 495–511, Advances in Cryptology EUROCRYPT 2001, Ed Birgit Pfitzmann, Springer.