1. Lecture Notes in Computer Science;M Abdalla,2010
2. Abelson, H., et al.: The risks of key recovery, key escrow, and trusted third-party encryption (1997)
3. Abelson, H., et al.: Keys under doormats: mandating insecurity by requiring government access to all data and communications. (July 6) 2015. Google Scholar Google Scholar Digital Library Digital Library (2015)
4. Banfi, F., Gegier, K., Hirt, M., Maurer, U., Rito, G.: Anamorphic encryption, revisited. Cryptology ePrint Arch. Report 2023/249 (2023), https://eprint.iacr.org/2023/249
5. Lecture Notes in Computer Science;M Bellare,2001