1. Lecture Notes in Computer Science;E Andreeva,2015
2. Lecture Notes in Computer Science;M Bellare,2006
3. Bellare, M., Bernstein, D.J., Tessaro, S.: Hash-function based PRFs: AMAC and its multi-user security. Cryptology ePrint Archive, Report 2016/142 (2016).
https://eprint.iacr.org/
4. Lecture Notes in Computer Science;M Bellare,1996
5. Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: the cascade construction and its concrete security. In: 37th FOCS, pp. 514–523. IEEE Computer Society Press, October 1996