1. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A Concrete Security Treatment of Symmetric Encryption,” in Proceedings of the 38th Symposium on Foundation of Computer Science, IEEE Computer Society Press, Los Alamitos, pp. 394–403, 1997.
2. M. Bellare, J. Kilian, and P. Rogaway, “The Security of Cipher Block Chaining,” in Advances in Cryptology — Crypto '94, Lecture Notes in Computer Science, vol. 839, Springer, Berlin, pp. 341–358, 1994.
3. M. Bellare and P. Rogaway, “Provably Secure Session Key Distribution — The Three Party Case,” in Proceedings of the 27th Symposium on Theory of Computing, ACM, New York, pp. 57–66, 1995.
4. M. Bellare and P. Rogaway, “Collision Resistant Hashing, Towards Making UOWHFs practical,” in Advances in Cryptology — Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, pp. 470–484, 1997.
5. E. Biham and A. Shamir, “Differential Fault Analysis of Secret Key Cryptosystems,” in Advances in Cryptology — Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, pp. 513–525, 1997.