[FNW96]
R. Fagin, M. Naor, P. Winkler: 1996, “Comparing Information Without Leaking It”, in Communications of the ACM, Volume 39, Number 5, pp. 77-85.
[TEE06]
W. Teepe: 2006, “Proving possession of arbitrary secrets while not giving them away: new protocols and a proof in GNY logic”, in Synthese, Volume 149, Number 2, Springer, pp. 409-443.
[DAM88]
L. Damgård: 1988, “Collision Free Hash Functions and Public Key Signature Schemes”, in D. Chaum and W. Price (eds.), EUROCRYPT, Lecture Notes in Computer Science, Volume 304, Springer Verlag, Berlin, pp. 203-216.
[GMW91]
O. Goldreich, S. Micali, A. Wigderson: 1991, “Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs”, in JACM 38, pp. 691-729.
[TSU92]
G. Tsudik: 1992, “Message Authentication with One-Way Hash Functions”, in Proceedings of IEEE INFOCOM 1992, IEEE Computer Society Press, Los Angeles, pp. 2055-2059.
[BSP95]
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk: 1995, “Cryptographic Has Functions: A Survey”, in Technical Report 95-09, Department of Computer Science, University of Wollongong.
[SCH96]
B. Schneier: 1996, “Applied Cryptography”, John Wiley & Sons, New York.
[BAL99]
A. Baltag: 1999, “A logic of Epistemic Actions”, Manuscript, CWI.
[ANTLR]
T. Parr and Contributors, “ANTLR - ANother Tool for Language Recognition”,
www.antlr.org
[GRAPHVIZ]
AT&T Research and Contributors, “Graphviz - Graph Visualization Software”,
www.graphviz.org