1. Albertini, A., Duong, T., Gueron, S., Kölbl, S., Luykx, A., Schmieg, S.: How to abuse and fix authenticated encryption without key commitment. In: USENIX Security 2022, pp. 3291–3308 (2022)
2. Lecture Notes in Computer Science;E Andreeva,2014
3. Lecture Notes in Computer Science;F Armknecht,2011
4. Lecture Notes in Computer Science;M Barbosa,2018
5. Bellare, M., et al.: Ask your cryptographer if context-committing AEAD is right for you. In: Real World Crypto Symposium (RWC), vol. 2023 (2023)