1. A Modular Approach to the Design and Analysis of Authentication and Key Exchange;Bellare,1998
2. Entity Authentication and Key Distribution;Bellare,1994
3. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols;Bellare,1993
4. Authenticated Key Exchange Secure against Dictionary Attacks;Bellare,2000
5. Hierarchical Identity based Encryption with Constant Size Ciphertext;Boneh,2005