1. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). JoC 15(2), 103–127 (2002)
2. Barak, B.: How to go beyond the black-box simulation barrier. In: 42nd FOCS, pp. 106–115. IEEE Computer Society, Los Alamitos (2001)
3. Lecture Notes in Computer Science;D. Boneh,2008
4. Lecture Notes in Computer Science;J. Black,2003
5. Lecture Notes in Computer Science;J.L. Camenisch,2001