1. Lecture Notes in Computer Science;M Abdalla,2010
2. Lecture Notes in Computer Science;M Bellare,2006
3. Lecture Notes in Computer Science;M Bellare,1996
4. Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: The cascade construction and its concrete security. In: Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996, pp. 514–523. IEEE (1996)
5. Bellare, M., Canetti, R., Krawczyk, H.: HMAC: Keyed-hashing for message authentication. Internet Request for Comment RFC, 2104 (1997)