1. Lect Notes Comput Sci;M. Bellare,1996
2. M. Bellare, A. Desai, E. Jokipii AND P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proc. of the 38th IEEE FOCS, IEEE, 1997.
3. Lect Notes Comput Sci;M. Bellare,1998
4. Lect Notes Comput Sci;M. Bellare,1994
5. M. Bellare, C. Namprempre, “Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm,” Full version of this paper, available via http://www-cse.ucsd.edu/users/mihir .