1. Bellare, M., Goldreich, O., Mityagin, A.: The power of verification queries in message authentication and authenticated encryption. Cryptology ePrint Archive: Report 2004/309
2. Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences (JCSS) 61(3), 362–399 (2000); Earlier version in Crypto 1994
3. Bellare, M., Pietrzak, K., Rogaway, P.: Improved security analyses for CBC MACs. Full version of this paper. Available via authors’ web pages
4. Bellare, M., Rogaway, P.: The game-playing technique. Cryptology ePrint Archive: Report 2004/331
5. Lecture Notes in Computer Science;A. Berendschot,1995