1. B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, Security amplification by composition: the case of doubly-iterated, ideal ciphers, Proc. of CRYPTO 98.
2. M. Bellare, J. Kilian and P. Rogaway, The security of cipher block chaining, Proc. of CRYPTO 94.
3. D. Boneh, and R. Lipton, A revocable backup system, Proc. of USENIX 97.
4. J. Bos, Booting problems with the JEC Computer, personal communication, 1983.
5. G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, How to forget a secret, full version of this paper, available from authors.