1. Lecture Notes in Computer Science;G Arfaoui,2021
2. Lecture Notes in Computer Science;M Bellare,1996
3. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In FOCS. IEEE (1997)
4. Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: ACM CCS. ACM (2017)
5. Bultel, X.: CCA secure a posteriori openable encryption in the standard model. Cryptology ePrint Archive, Report 2021/1504 (2021). https://ia.cr/2021/1504