1. Guo, F., Susilo, W., Mu, Y.: Introduction to Security Reduction. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-319-93049-7
2. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press (2014). https://www.crcpress.com/Introduction-to-Modern-Cryptography-Second-Edition/Katz-Lindell/p/book/9781466570269
3. Bagherzandi, A., Azimian, K., Mohajeri, J., Salmasizadeh, M.: Relations between semantic security and indistinguishability against CPA, non-adaptive CCA and adaptive CCA in comparison based framework. CoRR, vol. abs/cs/0508110 (2005). http://arxiv.org/abs/cs/0508110
4. Boneh, D., Shoup, V.: A graduate course in applied cryptography (2020). http://toc.cryptobook.us/book.pdf
5. Lecture Notes in Computer Science;D Boneh,2001