M. Bellare, A. Boldyreva, L. R. Knudsen, and C. Namprempre, Online Ciphers and the Hash-CBC Construction, CRYPTO 2001, pp.292-309, 2001.
DOI : 10.1007/3-540-44647-8_18

M. Bellare, A. Boldyreva, L. R. Knudsen, and C. Namprempre, On-line Ciphers and the Hash-CBC Constructions, Journal of Cryptology, vol.12, issue.1, pp.640-679, 2012.
DOI : 10.1007/s00145-011-9106-1

M. Bellare, A. Boldyreva, and A. Neill, Deterministic and Efficiently Searchable Encryption, CRYPTO 2007, pp.535-552, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.38-394, 1997.
DOI : 10.1109/SFCS.1997.646128

M. Bellare and P. Rogaway, Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography, ASIACRYPT 2000, pp.317-330, 2000.
DOI : 10.1007/3-540-44448-3_24

M. Bellare and P. Rogaway, Introduction to Modern Cryptography, UCSD CSE 207 Course Notes, p.207, 2005.

M. Bellare and P. Rogaway, The Security of Triple Encryption and a Framework??for??Code-Based??Game-Playing??Proofs, EUROCRYPT 2006, pp.409-426, 2006.
DOI : 10.1007/11761679_25

C. M. Campbell, Design and specification of cryptographic capabilities, IEEE Communications Society Magazine, vol.16, issue.6, pp.15-19, 1978.
DOI : 10.1109/MCOM.1978.1089775

N. Dayan, M. K. Svendsen, M. Bjørling, P. Bonnet, and L. Bouganim, EagleTree, Proceedings of the VLDB Endowment, vol.6, issue.12, pp.1290-1293, 2013.
DOI : 10.14778/2536274.2536298

URL : https://hal.archives-ouvertes.fr/hal-00935797

M. Dworkin, Recommendation for Block Cipher Modes of Operation: The XTS- AES Mode for Confidentiality on Storage Devices, NIST SP, pp.800-838, 2010.
DOI : 10.6028/NIST.SP.800-38e

N. Ferguson, AES-CBC + Elephant diffuser: A Disk Encryption Algorithm for Windows Vista, 2006.

C. Fruhwirth, New methods in hard disk encryption, 2005.

K. Gjøsteen, Security Notions for Disk Encryption, ESORICS 2005, pp.455-474, 2005.
DOI : 10.1007/11555827_26

J. Götzfried and T. Müller, Analysing Android's Full Disk Encryption Feature, JoWUA, vol.5, issue.1, pp.84-100, 2014.

M. Halcrow, U. Savagaonkar, T. Ts-'o, and I. Muslukhov, EXT4 Encryption Design Document (public version), 2015.

S. Halevi, Re: Lrw key derivation (formerly pink-herring), IEEE P1619 Mailing List, 2006.

S. Halevi and P. Rogaway, A Parallelizable Enciphering Mode, CT-RSA 2004, pp.292-304, 2004.
DOI : 10.1007/978-3-540-24660-2_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6717

A. Joux, G. Martinet, and F. Valette, Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC, CRYPTO 2002, pp.17-30, 2002.
DOI : 10.1007/3-540-45708-9_2

C. Jutla, Attack on Free-MAC (2000), https://groups

C. S. Jutla, Encryption modes with almost free message integrity, EURO- CRYPT 2001, pp.529-544, 2001.
DOI : 10.1007/3-540-44987-6_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.7292

T. Müller and F. C. Freiling, A Systematic Assessment of the Security of Full Disk Encryption, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.5, pp.491-503, 2015.
DOI : 10.1109/TDSC.2014.2369041

M. Nandi, Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC, INDOCRYPT 2008, pp.350-362, 2008.
DOI : 10.1007/s00145-003-0220-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2987

P. Rogaway, Nonce-Based Symmetric Encryption, FSE 2004, pp.348-359, 2004.
DOI : 10.1007/978-3-540-25937-4_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6810

P. Rogaway, Evaluation of Some Blockcipher Modes of Operation, Tech. rep., CRYPTREC Investigation Report, 2011.

P. Rogaway and H. Zhang, Online Ciphers from Tweakable Blockciphers, CT- RSA 2011, pp.237-249, 2011.
DOI : 10.1007/978-3-540-74619-5_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.676

M. J. Saarinen, Encrypted Watermarks and Linux Laptop Security, WISA 04, pp.27-38, 2004.
DOI : 10.1007/978-3-540-31815-6_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1265