1. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103–127 (2002)
2. Abadi, M., Warinschi, B.: Security analysis of cryptographically controlled access to xml documents. In: Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), Baltimore, Maryland, June 2005, pp. 108–117. ACM Press, New York (2005)
3. Lecture Notes in Computer Science;D. Beaver,1993
4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: focsed (ed.) 38th FOCSAnnual Symposium on Foundations of Computer Science, October, pp. 394–403. IEEE Computer Society Press, Los Alamitos (1997)
5. Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multiparty computation. In: stoced (ed.) 28th ACM STOCAnnual ACM Symposium on Theory of Computing, May, pp. 639–648. ACM Press, New York (1996)