1. Public-key encryption in a multi-user setting: security proofs and improvements;Bellare,2000
2. Randomness reuse in multi-recipient encryption schemes;Bellare,2002
3. On defining proofs of knowledge;Bellare,1992
4. Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation;Bellare,2006
5. Safeguarding cryptographic keys;Blakley;Processing Societies Proceedings,1979