The Security of the Cipher Block Chaining Message Authentication Code, Journal of Computer and System Sciences, vol.61, issue.3, pp.362-399, 2000. ,
DOI : 10.1006/jcss.1999.1694
Introduction to Mordern Cryptography ,
The Security of ???One-Block-to-Many??? Modes of Operation, LNCS, vol.2887, pp.376-395, 2003. ,
DOI : 10.1007/978-3-540-39887-5_27
How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.210-217, 1986. ,
DOI : 10.1145/6490.6503
Cryptographic extraction and key derivation: The HKDF scheme, CRYPTO 2010, LNCS, vol.6223, pp.631-648, 2010. ,
DOI : 10.1007/978-3-642-14623-7_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.593.5659
How to Construct Pseudorandom Permutations from Pseudorandom Functions, SIAM Journal on Computing, vol.17, issue.2, pp.373-386, 1988. ,
DOI : 10.1137/0217022
On the Construction of Pseudorandom Permutations: Luby???Rackoff Revisited, Journal of Cryptology, vol.12, issue.1, pp.29-66, 1999. ,
DOI : 10.1007/PL00003817
How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function Advances in Cryptology -Eurocrypt, LNCS, vol.92, issue.658, pp.256-266, 1992. ,