1. Lect Notes Comput Sci;M. Abdalla,2000
2. R. Anderson, “Two Remarks on Public-Key Cryptology,” Manuscript, 2000, and Invited Lecture at the Fourth Annual Conference on Computer and Communications Security, Zurich, Switzerland, April 1997. 3, 4
3. Lect Notes Comput Sci;D. Beaver,1992
4. Lect Notes Comput Sci;M. Bellare,1996
5. M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997. 5, 6, 7