1. New hash functions for message authentication in : Advances in cryptology Notes in pp Springer;Krawczyk;Eurocrypt Lecture Computer Science,1995
2. MMH : Software message authentication in the Gbit second rates in : Fast Software Lecture Notes in pp Springer;Halevi;Encryption FSE Computer Science,1997
3. Bounds and characterizations of authentica - tion secrecy schemes Designs Codes and;Casse;Cryptography,1998
4. The security and performance of the Galois / Counter Mode of operation Progress in;McGrew;Cryptology Indocrypt,2004
5. New bounds and constructions for authentication / secrecy codes with split - ting of;Soete;Journal Cryptology,1991