1. Lecture Notes in Computer Science;J Alwen,2019
2. Balli, F., Rösler, P., Vaudenay, S.: Determining the core primitive for optimally secure ratcheting. Cryptology ePrint Archive, Report 2020/148 (2020). full version of this article. Available at https://eprint.iacr.org/2020/148
3. Lecture Notes in Computer Science;M Bellare,2017
4. Caforio, A., Durak, F.B., Vaudenay, S.: On-demand ratcheting with security awareness. Cryptology ePrint Archive, Report 2019/965 (2019). https://eprint.iacr.org/2019/965
5. Checkoway, S., et al.: On the practical exploitability of dual EC in TLS implementations. In: Fu, K., Jung, J. (eds.) USENIX Security 2014, pp. 319–335. USENIX Association (2014)