1. Lecture Notes in Computer Science;M Bellare,1996
2. Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: the cascade construction and its concrete security. In: Proceedings of the 37th IEEE Symposium on Foundations of Computer Science, pp. 514–523 (1996)
3. Lecture Notes in Computer Science;M Bellare,2003
4. Lecture Notes in Computer Science;M Bellare,2006
5. Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004/331 (2006). http://eprint.iacr.org/