M. Bellare and S. Miner, A Forward-Secure Digital Signature Scheme, Advances in Cryptology ? CRYPTO' 99, pp.786-786, 1999.
DOI : 10.1007/3-540-48405-1_28

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.165

J. Buchmann, E. Dahmen, S. Ereth, A. Hülsing, and M. Rückert, On the Security of the Winternitz One-Time Signature Scheme, Lecture Notes in Computer Science, vol.0, issue.2, pp.363-378, 2011.
DOI : 10.1109/SFCS.1994.365700

J. Buchmann, E. Dahmen, and A. Hülsing, XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions, Lecture Notes in Computer Science, vol.14, issue.2, pp.117-129, 2011.
DOI : 10.1007/978-3-540-24676-3_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6086

J. Buchmann, E. Dahmen, E. Klintsevich, K. Okeya, and C. Vuillaume, Merkle Signatures with Virtually Unlimited Signature Capacity, Applied Cryptography and Network Security, pp.31-45, 2007.
DOI : 10.1007/978-3-540-72738-5_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.1374

J. Buchmann, E. Dahmen, and M. Schneider, Merkle Tree Traversal Revisited, Post-Quantum Cryptography, pp.63-78, 2008.
DOI : 10.1007/978-3-540-24676-3_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.4170

J. Buchmann, L. C. Coronado-garcía, E. Dahmen, M. Döring, and E. Klintsevich, CMSS ??? An Improved Merkle Signature Scheme, Lecture Notes in Computer Science, vol.4329, pp.349-363, 2006.
DOI : 10.1007/11941378_25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.420.7735

E. Dahmen, K. Okeya, T. Takagi, and C. Vuillaume, Digital Signatures Out of Second-Preimage Resistant Hash Functions, Post-Quantum Cryptography, pp.109-123, 2008.
DOI : 10.1007/11426639_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.559.9731

G. B. Dantzig, Linear Programming And Extensions, 1963.
DOI : 10.1515/9781400884179

A. Hülsing, C. Busold, and J. Buchmann, Forward Secure Signatures on Smart Cards, Selected Areas in Cryptography, pp.66-80, 2013.
DOI : 10.1007/978-3-642-35999-6_5

K. Arjen and . Lenstra, Key lengths. Contribution to The Handbook of Information Security, 2004.

T. Malkin, D. Micciancio, and S. Miner, Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods, Advances in Cryptology ? EUROCRYPT 2002, pp.400-417, 2002.
DOI : 10.1007/3-540-46035-7_27

S. Moritz, A Mixed Integer Approach for the Transient Case of Gas Network Optimization, 2007.