1. Bellare, M., Tackmann, B.: The multi-user security of authenticated encryption: AES-GCM in TLS1.3. In: Advances in Cryptology—CRYPTO 2016, pp. 247–276 (2016)
2. Meyer, C., Somorovsky, J., Weiss, E., Schwenk, J., Schinzel, S., Tews, E.: Revisiting SSL/TLS implementations: new bleichenbacher side channels and attacks. In: 23rd USENIX Security Symposium (USENIX 2014), pp. 733–748 (2014)
3. Krawczyk, H., Paterson, K.G., Wee, H.: On the security of the TLS protocol: a systematic analysis. In: Advances in Cryptology—CRYPTO 2013, pp. 429–448 (2013)
4. Lecture Notes in Computer Science;X. Wang,2005
5. Federal Information Processing Standards Publication 180-2. http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf