1. Optimal asymmetric encryption – how to encrypt with RSA;Bellare,1995
2. Random oracles are practical: a paradigm for designing efficient protocols;Bellare,1993
3. GEM: a generic chosen-ciphertext secure encryption method;Coron,2002
4. A public key cryptosystem and a signature scheme based on discrete logarithms;Elgamal;IEEE Transactions on Information Theory,1985
5. How to enhance the security of public-key encryption at minimum cost;Fujisaki,1999