Ben Morris, Phillip Rogaway, Till Stegers. "How to Encipher Messages on a Small Domain". CRYPTO 2009. (pdf)
usenix.org
S. Bono, M. Green, A. Stubblefield, A. Rubin, A. Juels, M. Szydlo. "Security Analysis of a Cryptographically-Enabled RFID Device". In Proceedings of the USENIX Security Symposium, August 2005. (pdf)
worldcat.org
Luby, Michael; Rackoff, Charles (1988), «How to Construct Pseudorandom Permutations from Pseudorandom Functions», SIAM Journal on Computing, ISSN0097-5397, 17 (2): 373–386, doi:10.1137/0217022