1. Jens-Matthias Bohli, Stefan Röhrich, and Rainer Steinwandt, Key substitution attacks revisited: Taking into account malicious signers, International Journal of Information Security 5 (2006), no. 1, 30–36.
  2. Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, and Consuelo Martínez, Weak keys in MST1, Des. Codes Cryptogr. 37 (2005), no. 3, 509–524.[MR]