1. Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) ≪ cost(signature) + cost(encryption). In: Proc of Crypto 1997, LNCS Vol. 1294. Berlin: Springer-Verlag, 1997. 165–179
2. Horster P, Michels M, Petersen H. Authenticated encryption schemes with low communication costs. Electr Lett, 1994, 30: 1212–1213
3. An J H. Authenticated encryption in the public-key setting: security notions and analysis. Available at http://eprint.iacr.org/2001/079
4. An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Proc of Eurocrypt 2002, LNCS Vol. 2332. Berlin: Springer-Verlag, 2002. 83–107
5. Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: Proc of Asiacrypt 2000, LNCS 1976. Berlin: Springer-Verlag, 2000. 531–545