1. Robust encryption;Abdalla,2010
2. Related-key security for pseudorandom functions beyond the linear barrier;Abdalla,2014
3. Semantic security under related-key attacks and applications;Applebaum,2011
4. Pseudorandom functions and permutations provably secure against related-key attacks;Bellare,2010
5. Cryptography secure against related-key attacks and tampering;Bellare,2011