1. Advanced Encryption Standard, U.S. Department of Commerce, November 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
. Accessed Nov 2010.
2. AVISPA. Automated Validation of Internet Security Protocols and Applications.
http://www.avispa-project.org/
. Accessed Aug 2015.
3. AVISPA. AVISPA Web Tool.
http://www.avispa-project.org/web-interface/expert.php/
. Accessed Aug 2015.
4. Bellare, M., Boldyreva, A., & Micali, S. (2000). Public-key encryption in a multi-user setting: Security proofs and improvements. In Advances in cryptology—EUROCRYPT 2000 (pp. 259–274). Springer.
5. Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing (STOC) (pp. 419–428). Dallas: ACM.