1. Baldwin, R., Rivest, R.: RFC 2040: The RC5, RC5-CBC, RC-5CBCPad, and RC5-CTS Algorithms (October 30, 1996), available at ftp://ds.internic.net/rfc/rfc2040.txt
2. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A Concrete Security Treatment of Symmetric Encryption. In: Proceedings of the 38th Symposium on Foundations of Computer Science, pp. 394–403. IEEE, Los Alamitos (1997), A full version of this paper is available at http://www-cse.ucsd.edu/users/mihir
3. Bellare, M., Guerin, R., Rogaway, P.: XOR MACs: New methods for message authentication using finite pseudo-random functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.??963, pp. 15???28. Springer, Heidelberg (1995);
4. Also U.S. Patent No. 5,757,913 (May 1998), and U.S. Patent No. 5,673,318 (September 1997)
5. Lecture Notes in Computer Science;M. Bellare,1994