Zheng, Yuliang; Matsumoto, Tsutomu; Imai, Hideki (20 August 1989). "On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses". Advances in Cryptology — CRYPTO' 89 Proceedings. Lecture Notes in Computer Science. Vol. 435. pp. 461–480. doi:10.1007/0-387-34805-0_42. ISBN978-0-387-97317-3.
Bono, Stephen; Green, Matthew; Stubblefield, Adam; Juels, Ari; Rubin, Aviel; Szydlo, Michael (5 August 2005). "Security Analysis of a Cryptographically-Enabled RFID Device"(PDF). Proceedings of the USENIX Security Symposium. Retrieved 21 November 2017.
worldcat.org
search.worldcat.org
Luby, Michael; Rackoff, Charles (April 1988), "How to Construct Pseudorandom Permutations from Pseudorandom Functions", SIAM Journal on Computing, 17 (2): 373–386, doi:10.1137/0217022, ISSN0097-5397.