1. Lecture Notes in Computer Science;M Abdalla,2010
2. Albertini, A., Duong, T., Gueron, S., Kölbl, S., Luykx, A., Schmieg, S.: How to abuse and fix authenticated encryption without key commitment. In: Butler, K.R.B., Thomas, K. (eds.) USENIX Security 2022, pp. 3291–3308. USENIX Association (2022)
3. Lecture Notes in Computer Science;M Barbosa,2018
4. LNCS;M Bellare,2022
5. Bellare, M., Hoang, V.T.: Succinctly-committing Authenticated Encryption. Cryptology ePrint Archive (2024)