1. Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: A new framework for hybrid encryption. IACR ePrint archive 2005/027 (2005), Available at
http://eprint.iacr.org/2005/027
Newer version in [2]
2. Lecture Notes in Computer Science;M. Abe,2005
3. Aumasson, J.-P.: On the pseudo-random generator ISAAC. IACR ePrint archive 2006/438 (2006), Available at
http://eprint.iacr.org/2006/438
4. Lecture Notes in Computer Science;T. Baignères,2004
5. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In (FOCS’97). Proceedings of the 38th Annual Symposium on Foundations of Computer Science, p. 394. IEEE Computer Society, Los Alamitos (1997)