1. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997, (394–403). A full version of this paper is available at http://www-cse.ucsd.edu/users/mihir .
2. Lect Notes Comput Sci;M. Bellare,1995
3. M. Bellare and C. Namprempre, “Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm,” manuscript, May 26, 2000. http://eprint.iacr.org/2000.025.ps .
4. Lect Notes Comput Sci;E. Buonanno,2001
5. C.M. Campbell, “Design and Specification of Cryptographic Capabilities,” in Computer Security and the Data Encryption Standard, (D.K. Brandstad (ed.)) National Bureau of Standards Special Publications 500-27, U.S. Department of Commerce, February 1978, pp. 54–66.