1. M. Bellare AND A. Boldyreva, “The security of chaffing and winnowing,” Full version of this paper, available via http://www-cse.ucsd.edu/users/mihir .
2. M. Bellare, A. Desai, E. Jokipii AND P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
3. Lect Notes Comput Sci;M. Bellare,1994
4. M. Bellare AND P. Rogaway, “Random oracles are practical: a paradigm for designing efficient protocols,” Proceedings of the 1st Annual Conference on Computer and Communications Security, ACM, 1993.
5. Lect Notes Comput Sci;M. Bellare,1994