1. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE, Los Alamitos (1997)
2. Lecture Notes in Computer Science;M. Bellare,1995
3. Lecture Notes in Computer Science;M. Bellare,1996
4. Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences (JCSS) 61(3), 362–399 (2000)
5. Bellare, M., Kohno, T., Namprempre, C.: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. In: Proceedings of the 9th Annual Conference on Computer and Communications Security. ACM, New York (2002)