1. Lecture Notes in Computer Science;M Bellare,1995
2. Lecture Notes in Computer Science;M Bellare,1994
3. Lecture Notes in Computer Science;M Bellare,2005
4. Bellare, M., Rogaway, P.: Code-based game-playing proofs and the security of triple encryption. Cryptology ePrint Archive, Report 2004/331 (2004). http://eprint.iacr.org/2004/331
5. Lecture Notes in Computer Science;M Bellare,2006