1. Recognizing primes in random polynomial time;Adleman,1987
2. Trading group theory for randomness;Babai,1985
3. Cryptographic capsules: A disjunctive primitive for interactive protocols;Benaloh (Cohen),1987
4. Aspects and importance of secure implementations of identification systems;Bengio,1987
5. An update on quantum cryptography;Bennett,1985