1. Lecture Notes in Computer Science;M Backes,2004
2. Barbosa, M., et al.: Sok: computer-aided cryptography. In: IEEE Symposium on Security and Privacy (2021)
3. Lecture Notes in Computer Science;G Barthe,2011
4. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. IACR Cryptol. ePrint Arch 1998, 9 (1998). http://eprint.iacr.org/1998/009
5. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: FOCS, pp. 394–403 (1997)