1. Lecture Notes in Computer Science;M Abdalla,2010
2. Albertini, A., Duong, T., Gueron, S., Kölbl, S., Luykx, A., Schmieg, S.: How to abuse and fix authenticated encryption without key commitment. In: 31st USENIX Security Symposium (2022)
3. Lecture Notes in Computer Science;J Alwen,2016
4. Lecture Notes in Computer Science;J Alwen,2017
5. Armour, M., Cid, C.: Partition oracles from weak key forgeries. In: Conti, M., Stevens, M., Krenn, S. (eds.) CANS 2021. Springer, LNCS (2021)