Related-Key Security for Pseudorandom Functions Beyond the Linear BarrierMichel AbdallaFabrice Benhamoudaet al.2018Journal of Cryptology
Signal-flow-based analysis of wireless security protocolsÇağatay ÇaparDennis Goeckelet al.2013Information and Computation