1Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences.2000, 61(3): 362 ~ 399.
2Black J, Ragaway P. CBC MACs for arbitrary-length messages: the three-key constructions. Advances in Cryptology-CRYPTO'00, LNCS1880,Springer-Verlag, 2003, 197 ~ 215.
3Iwata T, Kurosawa K. OMAC: one-key CBC MAC. Fast Software Encryption 2003. LNCS 2887, Spriager-Verlag, 2003, 129 ~ 153.
4Bellare M, Guérin R, Rogaway P. XOR MACs: new methods for message authentication using finite pseudorandom functions. Advances in Cryptology-CRYPTO'95. LNCS 963, Spriager-Verlag, 1995,15~28.
5Black J, Rogaway P. A block-cipher mode of operation for parallelizable message authentication. Advances in Cryptology-EUROCRYPT'02. LNCS2332, Springer-Verlag, 2002, 384~ 397.
6Rogaway P, Bellare M, Black J, et al. OCB: a block-cipher mode of operation for efficient authenticated encryption. In: Proceedings of the 8th ACM Conference on Computer and Communication Security. philadelphia:ACM Press, 2001. 196 ~ 205.
7Liskov M, Rivest RL, Wagner D. Tweakable block ciphers. Advances in Cryptology-CRYPTO'02. LNCS 2442, Springer-Verlag, 2002,31 ~46.
8Crowley P. Mercy: a fast large block cipher for disk sector encryption. Fast SoftwareEncryption2000. LNCS 1978, Springer-Verlag, 2001, 49~63.