1. Abdalla, M., Benhamouda, F., Passelègue, A., Paterson, K.G.: Related-key security for pseudorandom functions beyond the linear barrier, full version of this paper available at Cryptology ePrint Archive,
http://eprint.iacr.org/
2. LNCS;A. Banerjee,2014
3. Lecture Notes in Computer Science;M. Bellare,2010
4. Bellare, M., Cash, D.: Pseudorandom functions and permutations provably secure against related-key attacks. Cryptology ePrint Archive, Report 2010/397 (2010),
http://eprint.iacr.org/
(last updated October 27, 2013)
5. Lecture Notes in Computer Science;M. Bellare,2011