1. Lect Notes Comput Sci;W. Aiello,1996
2. M. Bellare, A. Desai, E. Jokipii and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
3. M. Bellare, O. Goldreich and h. Krawczyk. Beyond the birthday barrier, without counters. Full version of this paper, available via
http://www-cse. ucsd.edu/users/mihir
.
4. Lect Notes Comput Sci;M. Bellare,1995
5. Lect Notes Comput Sci;M. Bellare,1994