
@article{diffie_new_1976,
	title = {New directions in cryptography},
	volume = {22},
	url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1055638},
	number = {6},
	urldate = {2013-10-09},
	journal = {Information Theory, {IEEE} Transactions on},
	author = {Diffie, Whitfield and Hellman, Martin},
	year = {1976},
  pages = {644--654},
},

@article{elgamal_public_1985,
	title = {A public key cryptosystem and a signature scheme based on discrete logarithms},
	volume = {31},
	issn = {0018-9448},
	doi = {10.1109/TIT.1985.1057074},
	number = {4},
	journal = {Information Theory, {IEEE} Transactions on},
	author = {Elgamal, T.},
	month = jul,
	year = {1985},
	pages = {469--472},
},

@article{koblitz_elliptic_1987,
	title = {Elliptic curve cryptosystems},
	volume = {48},
	url = {http://www.ams.org/mcom/1987-48-177/S0025-5718-1987-0866109-5/},
	number = {177},
	urldate = {2013-10-09},
	journal = {Mathematics of computation},
	author = {Koblitz, Neal},
	year = {1987},
	pages = {203--209},
},

@article{rivest_method_1978,
	title = {A method for obtaining digital signatures and public-key cryptosystems},
	volume = {21},
	url = {http://dl.acm.org/citation.cfm?id=359342},
	number = {2},
	urldate = {2013-10-09},
	journal = {Communications of the {ACM}},
	author = {Rivest, Ronald L. and Shamir, Adi and Adleman, Len},
	year = {1978},
	pages = {120--126},
},

@article{merkle_secure_1978,
	title = {Secure communications over insecure channels},
	volume = {21},
	number = {4},
	journal = {Commun. {ACM}},
	author = {Merkle, Ralph C.},
	year = {1978},
	pages = {294--299},
}
