1. N. Asokan, V. Niemi, K. Nyberg, Man-in-the-middle in tunneled authentication protocols, in: Proceedings of the International Workshop on Security Protocols, 2003, pp. 15–24 (also available as IACR ePrint 2002/163).
2. Secure object identification – or: solving the chess grandmaster problem;Alkassar,2003
3. Why cryptosystems fail;Anderson;Communications of the ACM,1994
4. M. Bellare, et al., A concrete security treatment of symmetric encryption: analysis of the DES modes of operation, in: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS ’97), 1997, pp. 394–403.
5. Chosen Ciphertext attacks against protocols based on the RSA encryption standard PKCS #1;Bleichenbacher,1998