K. Atighehchi, Space-efficient, byte-wise incremental and perfectly private encryption schemes, Cryptology ePrint Archive, vol.104, 2014.

K. Atighehchi, T. Muntean, K. Chen, Q. Xie, W. Qiu et al., Towards fully incremental cryptographic schemes, ASIACCS 13, pp.505-510, 2013.

M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, CRYPTO'94, vol.839, pp.216-233, 1994.

M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography and application to virus protection, 27th ACM STOC, pp.45-56, 1995.

M. Bellare, R. Guérin, and P. Rogaway, XOR MACs: New methods for message authentication using finite pseudorandom functions

, CRYPTO'95, vol.963, pp.15-28, 1995.

M. Bellare and D. Micciancio, A new paradigm for collision-free hashing: Incrementality at reduced cost. Cryptology ePrint Archive, 1997.

, 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006.

E. Buonanno, J. Katz, and M. Yung, Incremental unforgeable encryption, FSE 2001, vol.2355, pp.109-124, 2002.

M. Fischlin, Lower bounds for the signature size of incremental schemes, 38th FOCS, pp.438-447, 1997.

J. Gantz and D. Reinsel, The digital universe in 2010 : Big data, bigger digital shadows, and biggest growth in the far east, 2013.

B. M. Goi, M. U. Siddiqi, and H. T. Chuah, Incremental hash function based on pair chaining & modular arithmetic combining, DOCRYPT 2001, vol.2247, pp.50-61, 2001.

J. K. Hart and K. Martinez, Environmental sensor networks: A revolution in the earth system science?, Earth-Science Reviews, vol.78, issue.3, pp.177-191, 2006.

W. Itani, A. I. Kayssi, and A. Chehab, Energy-efficient incremental integrity for securing storage in mobile cloud computing, International Conference on Energy Aware Computing, pp.1-2, 2010.

D. Micciancio, Oblivious data structures: Applications to cryptography, 29th ACM STOC, pp.456-464, 1997.

H. Mihajloska, D. Gligoroski, and S. Samardjiska, Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3. Cryptology ePrint Archive, 1028.
URL : https://hal.archives-ouvertes.fr/hal-01445801

I. Mironov, O. Pandey, O. Reingold, and G. Segev, Incremental deterministic publickey encryption, EUROCRYPT 2012, vol.7237, pp.628-644, 2012.

R. C. Phan and D. A. Wagner, Security considerations for incremental hash functions based on pair block chaining, Computers & Security, vol.25, issue.2, pp.131-136, 2006.

Y. Sasaki and K. Yasuda, A new mode of operation for incremental authenticated encryption with associated data, SAC 2015, vol.9566, pp.397-416, 2016.