Ames, Scott; Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan (). „Ligero”. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery. pp. 2087–2104. doi:10.1145/3133956.3134104. ISBN9781450349468.
Bünz, B; Bootle, D; Boneh, A (). „Bulletproofs: Short Proofs for Confidential Transactions and More”. 2018 IEEE Symposium on Security and Privacy (SP). San Francisco, California. pp. 315–334. doi:10.1109/SP.2018.00020. ISBN978-1-5386-4353-2.
Ben-Sasson, Eli; Chiesa, Alessandro; Genkin, Daniel; Tromer, Eran; Virza, Madars (). „SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge”. Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. 8043. pp. 90–108. doi:10.1007/978-3-642-40084-1_6. hdl:1721.1/87953. ISBN978-3-642-40083-4.
Wahby, Riad S.; Setty, Srinath; Ren, Zuocheng; Blumberg, Andrew J.; Walfish, Michael (). „Efficient RAM and Control Flow in Verifiable Outsourced Computation”. Proceedings 2015 Network and Distributed System Security Symposium. doi:10.14722/ndss.2015.23097. ISBN978-1-891562-38-9.
Eberhardt, Jacob; Tai, Stefan (iulie 2018). „ZoKrates - Scalable Privacy-Preserving Off-Chain Computations”. 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 1084–1091. doi:10.1109/Cybermatics_2018.2018.00199. ISBN978-1-5386-7975-3.
Kosba, Ahmed; Papamanthou, Charalampos; Shi, Elaine (mai 2018). „XJsnark: A Framework for Efficient Verifiable Computation”. 2018 IEEE Symposium on Security and Privacy (SP). pp. 944–961. doi:10.1109/SP.2018.00018. ISBN978-1-5386-4353-2.
Zhang, Yupeng; Genkin, Daniel; Katz, Jonathan; Papadopoulos, Dimitrios; Papamanthou, Charalampos (mai 2018). „VRAM: Faster Verifiable RAM with Program-Independent Preprocessing”. 2018 IEEE Symposium on Security and Privacy (SP). pp. 908–925. doi:10.1109/SP.2018.00013. ISBN978-1-5386-4353-2.
Bünz, B; Bootle, D; Boneh, A (). „Bulletproofs: Short Proofs for Confidential Transactions and More”. 2018 IEEE Symposium on Security and Privacy (SP). San Francisco, California. pp. 315–334. doi:10.1109/SP.2018.00020. ISBN978-1-5386-4353-2.
Wahby, Riad S.; Tzialla, Ioanna; Shelat, Abhi; Thaler, Justin; Walfish, Michael (mai 2018). „Doubly-Efficient zkSNARKs Without Trusted Setup”. 2018 IEEE Symposium on Security and Privacy (SP). pp. 926–943. doi:10.1109/SP.2018.00060. ISBN978-1-5386-4353-2.
Zhang, Jiaheng; Xie, Tiancheng; Zhang, Yupeng; Song, Dawn (mai 2020). „Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof”. 2020 IEEE Symposium on Security and Privacy (SP). pp. 859–876. doi:10.1109/SP40000.2020.00052. ISBN978-1-7281-3497-0.
Ames, Scott; Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan (). „Ligero”. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery. pp. 2087–2104. doi:10.1145/3133956.3134104. ISBN9781450349468.
Ben-Sasson, Eli; Chiesa, Alessandro; Genkin, Daniel; Tromer, Eran; Virza, Madars (). „SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge”. Advances in Cryptology – CRYPTO 2013. Lecture Notes in Computer Science. 8043. pp. 90–108. doi:10.1007/978-3-642-40084-1_6. hdl:1721.1/87953. ISBN978-3-642-40083-4.