1. Alwen, J., et al.: Keep the dirt: tainted TreeKEM, adaptively and actively secure continuous group key agreement. Cryptology ePrint Archive, Report 2019/1489 (2019). https://ia.cr/2019/1489
2. Barnes, R., Beurdouche, B., Robert, R., Millican, J., Omara, E., Cohn-Gordon, K.: The Messaging Layer Security (MLS) Architecture, chap. Pre-Shared Keys. Network Working Group (2022). https://messaginglayersecurity.rocks/mls-protocol/draft-ietf-mls-protocol.html#name-pre-shared-keys
3. Barnes, R., Bhargavan, K., Lipp, B., Wood, C.A.: Hybrid Public Key Encryption. RFC 9180 (2022). https://doi.org/10.17487/RFC9180, https://www.rfc-editor.org/info/rfc9180
4. Lecture Notes in Computer Science;M Bellare,1994
5. Beurdouche, B., Rescorla, E., Omara, E., Inguva, S., Duric, A.: The Messaging Layer Security (MLS) Architecture, chap. Forward and Post-Compromise Security. Network Working Group (2022). https://messaginglayersecurity.rocks/mls-architecture/draft-ietf-mls-architecture.html#name-forward-and-post-compromise