1. Interactive Diffie–Hellman Assumptions With Applications to Password-Based Authentication;Abdalla,2005
2. Password-Based Authenticated Key Exchange in the Three-Party Setting;Abdalla,2005
3. The oracle Diffie–Hellman assumptions and an analysis of DHIES;Abdalla,2001
4. Authenticated key exchange secure against dictionary attacks;Bellare,2000
5. Ciphers with arbitrary finite domains;Black,2002