1. M. Abdalla and M. Bellare, “A comparative analysis of the security of rekeying techniques,” Full version of this paper, available via
http://www-cse.ucsd.edu/users/mihir
.
2. Lect Notes Comput Sci;M. Bellare,1996
3. M. Bellare, A. Desai, E. Jokipii and P. Rogaway, “A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation,” Proc. of the 38th IEEE FOCS, IEEE, 1997.
4. Lect Notes Comput Sci;M. Bellare,1999
5. Lect Notes Comput Sci;M. Bellare,1994