http://eprint.iacr.org/2014/838.pdf https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-kosba.pdf http://eprint.iacr.org/2013/454.pdf http://class.ece.iastate.edu/tyagi/cpre681/papers/p431-goldreich.pdf http://conservancy.umn.edu/bitstream/handle/11299/107353/oh375mh.pdf?sequence=1 http://www.ams.org/notices/201003/rtx100300357p.pdf http://www.ams.org/notices/200708/tx070800972p.pdf http://pqcrypto.org/www.springer.com/cda/content/document/cda_downloaddocument/9783540887010-c1.pdf http://academic.reed.edu/physics/faculty/crandall/papers/crypto8.pdf http://www.irisa.fr/celtique/zapalowicz/papers/asiacrypt2014.pdf http://mixmin.net/nymserver.pl http://hal-lirmm.ccsd.cnrs.fr/file/index/docid/106470/filename/D547.PDF http://math.arizona.edu/~mleslie/files/mp.pdf http://www.ibiblio.org/weidai/temp/Provable_Security.pdf http://www.cosic.esat.kuleuven.be/publications/article-2475.pdf http://cr.yp.to/factorization/smoothparts-20040510.pdf http://eprint.iacr.org/2015/339.pdf http://dash.harvard.edu/bitstream/handle/1/12561354/Interactive%20Proofs%20of%20Proximity.pdf?sequence=1 http://db.csail.mit.edu/pubs/tu-monomi-cr-vldb13.pdf https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf http://eprint.iacr.org/2015/1243.pdf https://www.cs.nyu.edu/~puniya/papers/merkle.pdf https://securewww.esat.kuleuven.be/cosic/publications/article-2547.pdf https://sidechannels.cr.yp.to/qkd/holographic-20160326.pdf http://eprint.iacr.org/2016/290.pdf http://crypto.stanford.edu/~dabo/pubs/papers/aggsurvey.pdf http://crypto.stanford.edu/~dabo/pubs/papers/aggreg.pdf https://eprint.iacr.org/2009/340.pdf https://www.cs.purdue.edu/homes/ninghui/papers/accumulator_acns07.pdf https://eprint.iacr.org/2014/796 http://people.seas.harvard.edu/~salil/research/timelock.pdf