[FNW96] R. Fagin, M. Naor, P. Winkler: 1996, “Comparing Information Without Leaking It”, in Communications of the ACM, Volume 39, Number 5, pp. 77-85.
[TEE06] W. Teepe: 2006, “Proving possession of arbitrary secrets while not giving them away: new protocols and a proof in GNY logic”, in Synthese, Volume 149, Number 2, Springer, pp. 409-443.
[DAM88] L. Damgård: 1988, “Collision Free Hash Functions and Public Key Signature Schemes”, in D. Chaum and W. Price (eds.), EUROCRYPT, Lecture Notes in Computer Science, Volume 304, Springer Verlag, Berlin, pp. 203-216.
[GMW91] O. Goldreich, S. Micali, A. Wigderson: 1991, “Proofs that Yield Nothing But their Validity or All Languages in NP have Zero-Knowledge Proofs”, in JACM 38, pp. 691-729.
[TSU92] G. Tsudik: 1992, “Message Authentication with One-Way Hash Functions”, in Proceedings of IEEE INFOCOM 1992, IEEE Computer Society Press, Los Angeles, pp. 2055-2059.
[BSP95] S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk: 1995, “Cryptographic Has Functions: A Survey”, in Technical Report 95-09, Department of Computer Science, University of Wollongong.
[SCH96] B. Schneier: 1996, “Applied Cryptography”, John Wiley & Sons, New York.
[BAL99] A. Baltag: 1999, “A logic of Epistemic Actions”, Manuscript, CWI.
[ANTLR] T. Parr and Contributors, “ANTLR - ANother Tool for Language Recognition”, www.antlr.org   ANTLR logo
[GRAPHVIZ] AT&T Research and Contributors, “Graphviz - Graph Visualization Software”, www.graphviz.org   GRAPHVIZ logo