1. Cryptographic agility and its relation to circular encryption;Acar,2010
2. Soundness of formal encryption in the presence of key-cycles;Adão,2005
3. Three’s compromised too: Circular insecurity for any cycle length from (ring-)LWE;Alamati,2016
4. Circular and KDM security for identity-based encryption;Alperin-Sheriff,2012
5. Public-key encryption in the bounded-retrieval model;Alwen,2010