M. Bellare, J. Kilian, and P. Rogaway, The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000.
DOI : 10.1006/jcss.1999.1694

M. Bellare and P. Rogaway, Introduction to Mordern Cryptography

H. Gilbert, The Security of ???One-Block-to-Many??? Modes of Operation, LNCS, vol.2887, pp.376-395, 2003.
DOI : 10.1007/978-3-540-39887-5_27

O. Goldreich, S. , G. , and S. Micali, How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.210-217, 1986.
DOI : 10.1145/6490.6503

H. Krawczyk, Cryptographic extraction and key derivation: The HKDF scheme, CRYPTO 2010, LNCS, vol.6223, pp.631-648, 2010.
DOI : 10.1007/978-3-642-14623-7_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.593.5659

M. Luby and C. Rackoff, How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, vol.17, issue.2, pp.373-386, 1988.
DOI : 10.1137/0217022

M. Naor and O. Reingold, On the Construction of Pseudorandom Permutations: Luby???Rackoff Revisited, Journal of Cryptology, vol.12, issue.1, pp.29-66, 1999.
DOI : 10.1007/PL00003817

J. Patarin, How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function Advances in Cryptology -Eurocrypt, LNCS, vol.92, issue.658, pp.256-266, 1992.