1. Ball, M.: Follow-up to NIST’s consideration of XTS-AES as standardized by IEEE Std 1619-2007. Public comments to NIST (2008),
http://tinyurl.com/nist-ball-xts
2. Lecture Notes in Computer Science;G.V. Bard,2007
3. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. In: FOCS 1997, pp. 394–403. IEEE Press (1997)
4. Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: a case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and System Security (TISSEC) 7(2), 206–241 (2004); Earlier version from CCS 2002
5. Lecture Notes in Computer Science;M. Bellare,2006