1. Lecture Notes in Computer Science;M. Abdalla,2001
2. Barak, B., Halevi, S.: An architecture for robust pseudo-random generation and applications to /dev/random. In: Proc. of ACM CCS. ACM, New York (2005)
3. Lecture Notes in Computer Science;B. Barak,2003
4. Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks. In: Proc. of the Symposium on Security and Privacy, pp. 72–84. IEEE, Los Alamitos (1992)
5. Lecture Notes in Computer Science;M. Bellare,1996