1. Abdalla M, Bresson E, Chevassut O, Pointcheval D (2006) Password-based group key exchange in a constant number of rounds. In: PKC 2006, New York. LNCS 3958, Springer, Berlin, pp 427–442
2. Balenson DM, McGrew DA, Sherman AT (1998) Key management for large dynamic groups: one-way function trees and amortized initialization. Advanced Sec Res J – NAI Labs 1(1): 27–46
3. Bellare M, Rogaway P (1994) Entity authentication and key distribution. In: Crypto ’93, Santa Barbara, CA. LNCS 773, Springer, Berlin, pp 232–249
4. Bellare M, Rogaway P (1995) Provably secure session key distribution: the three party case. In: STOC 1995, Las Vegas, NV. ACM, New York, pp 57–66
5. Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Eurocrypt 2000, Bruges, Belgium. LNCS 1807, Springer, Berlin, pp 139–155