1. D. Adrian, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Béguelin, P. Zimmermann, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J.A. Halderman, N. Heninger, D. Springall, E. Thomé, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Béguelin, P. Zimmermann, Imperfect forward secrecy: how diffie-hellman fails in practice. in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS ’15, (ACM, New York, NY, USA), CCS ’15, pp 5–17, (2015) https://doi.org/10.1145/2810103.2813707
2. N. Aviram, S. Schinzel, J. Somorovsky, N. Heninger, M. Dankel, J. Steube, L. Valenta, D. Adrian, J.A. Halderman, V. Dukhovni, E. Käsper, S. Cohney, S. Engels, C. Paar, Y. Shavitt, DROWN : Breaking TLS using SSLv2. in proceedings of the 25th USENIX security symposium (August):1–18, (2016) https://www.semanticscholar.org/paper/DROWN%3A-Breaking-TLS-Using-SSLv2-Aviram-Schinzel/2aa0e44b8529de8ee75138eade8aba0bfb9f008f
3. M. Bellare, P. Rogaway, Entity Authentication and Key Distribution. in Stinson DR (ed) Advances in Cryptology — CRYPTO’ 93, (Springer Berlin Heidelberg, Berlin, Heidelberg), pp. 232–249, (1994) https://doi.org/10.1007/3-540-48329-2_21
4. D. Benjamin, C.A. Wood, Importing External PSKs for TLS. Internet-Draft draft-ietf-tls-external-psk-importer-02, Internet Engineering Task Force, https://datatracker.ietf.org/doc/html/draft-ietf-tls-external-psk-importer-02, work in Progress (2019)
5. K. Bhargavan, B. Blanchet, N. Kobeissi, Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate. in 2017 IEEE symposium on security and privacy (SP), IEEE, pp. 483–502, (2017) https://doi.org/10.1109/SP.2017.26