1. Albertini, A., Duong, T., Gueron, S., Kolbl, S., Luykx, A., Schmieg, S.: How to abuse and fix authenticated encryption without key commitment. In: Butler, K.R.B., Thomas, K. (eds.), 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10–12 August 2022, pp. 3291–3308. USENIX Association (2022)
2. Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to /dev/random. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS ’05, New York, NY, USA, pp. 203–212. ACM (2005)
3. Lecture Notes in Computer Science;M Bellare,2022
4. Lecture Notes in Computer Science;M Bellare,2000
5. Lecture Notes in Computer Science;J Chan,2022