1. Bellovin, S.M., Merritt, M.: An attack on the Interlock protocol when used for authentication. IEEE Trans. Inf. Theory 40(1), 273–275 (1994)
2. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
3. Lecture Notes in Computer Science;M Bellare,2017
4. Cohn-Gordon, K., Cremers, C.J.F., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the Signal messaging protocol. In: Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P), pp. 451–466 (2017)
5. Lecture Notes in Computer Science;R Canetti,2001