1. J. Alwen, S. Coretti, Y. Dodis, The Double Ratchet: security notions, proofs, and modularization for the Signal protocol, in IACR Cryptology ePrint Archive 2018 (2018), p. 1037. https://eprint.iacr.org/2018/1037
2. C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, Tightly-secure authenticated key exchange, in TCC 2015, Part I, LNCS, vol. 9014. (Springer, Heidelberg, 2015), pp. 629–658
3. C. Bader, T. Jager, Y. Li, S. Schäge, On the Impossibility of Tight Cryptographic Reductions. Cryptology ePrint Archive, Report 2015/374 (2015). http://eprint.iacr.org/2015/374
4. C. Ballinger, ChatSecure. https://chatsecure.org/blog/chatsecure-v4-released/ (visited on 01/2017)
5. M. Bellare, A. Boldyreva, A. Palacio, An uninstantiable random-oracle-model scheme for a hybrid-encryption problem, in Advances in Cryptology-EUROCRYPT 2004 (Springer, 2004), pp. 171–188