1. M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In Proc. of the 30th STOC. ACM Press, New York, 1998.
2. Lect Notes Comput Sci;M. Bellare,2000
3. M. Bellare and P. Rogaway. Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62–73. ACM Press, New York, 1993.
4. Lect Notes Comput Sci;M. Bellare,1994
5. M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In Proc. of the 27th STOC. ACM Press, New York, 1995.