1. Lecture Notes in Computer Science;M. Bellare,2000
2. Bellare, M., Rogaway, P.: The AuthA Protocol for Password-Based Authenticated Key Exchange. Contributions to IEEE P1363 (March 2000)
3. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks. In: Proc. of the Symposium on Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)
4. Bellovin, S.M., Merritt, M.: Augmented Encrypted Key Exchange: A Password- Based Protocol Secure against Dictionary Attacks and Password File Compromise. In: Proc. of the 1st CCS, pp. 244–250. ACM Press, New York (1993)
5. Lecture Notes in Computer Science;V. Boyko,2000