1. Lecture Notes in Computer Science;M Abdalla,2014
2. Lecture Notes in Computer Science;H Abusalah,2016
3. Attrapadung, N., Matsuda, T., Nishimaki, R., Yamada, S., Yamakawa, T.: Constrained PRFs for $$ {NC}^1$$ in traditional groups. IACR Cryptol. ePrint Arch. 2018, 154 (2018)
4. Lecture Notes in Computer Science;D Boneh,2004
5. Bellare, M., Cash, D.: Pseudorandom functions and permutations provably secure against related-key attacks. IACR Cryptol. ePrint Arch., 397 (2010). Version 20150729:233210. Preliminary Version Appeared in CRYPTO 2010