1. R. J. Anderson and T. M. A. Lomas, “Fortifying Key Negotiation Schemes with Poorly Chosen Passwords,” Electronics Letters, vol. 30, pp. 1040–1041, June 1994.
2. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “Cryptographic Hash Functions: A Survey,” Tech. Rep. 95-09, Department of Computer Science, University of Wollongong, July 1995.
3. S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, “On Selectable Collisionful Hash Functions,” in the Astralian Conference on Information Security and Privacy, 1996. (To Appear).
4. S. M. Bellovin and M. Merritt, “Augmented Encrypted Key Exchange: a Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise,” tech. rep., AT&T, Nov. 1993.
5. T. A. Berson, L. Gong, and T. M. A. Lomas, “Secure, Keyed, and Collisionful Hash Functions,” Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. 1993. The revised version (September 2, 1994).