1. Lecture Notes in Computer Science;M. Abdalla,2001
2. Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. Full version of current paper. Available from authors’ web pages
3. Lecture Notes in Computer Science;M. Bellare,1996
4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th FOCS (October 1997)
5. Lecture Notes in Computer Science;M. Bellare,2000