1. J. An AND M. Bellare, “Does encryption with redundancy provide authenticity?” Full version of this paper, available via http://www-cse.ucsd.edu/users/mihir .
2. Lect Notes Comput Sci;M. Atici,1996
3. Lect Notes Comput Sci;M. Bellare,1996
4. M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proc. of the 38th IEEE FOCS, IEEE, 1997.
5. Lect Notes Comput Sci;M. Bellare,1998