1. Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F.-X., Yu, Y.: Leftover hash lemma, revisited. Cryptology ePrint Archive, Report 2011/088 (2011). http://eprint.iacr.org/
2. Lecture Notes in Computer Science;J Bouda,2009
3. Lecture Notes in Computer Science;M Bucci,2005
4. Lecture Notes in Computer Science;C Cachin,1997
5. Lecture Notes in Computer Science;M Dichtl,2007