1. Agarwal, M., Saxena, N., Kayal, N.: PRIMES is in P. Preprint. August 6 (2002), Available at http://www.cse.iitk.ac.in/news/primality.html
2. Lecture Notes in Computer Science;J. Baek,2000
3. Bellare, M., Boldyreva, A., Palacio, A.: An Uninstantiable Random- Oracle-Model Scheme for a Hybrid-Encryption Problem. Full version of this paper, Available at http://www-cse.ucsd.edu/users/mihir/
4. Baek, J., Lee, B., Kim, K.: Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption. ETRI Journal 22(4) (2000)
5. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, Los Alamitos (1997)