1. M. Abdalla, J.-M. Bohli, M. Vasco, R. Steinwandt, (Password) authenticated key establishment: from 2-party to group, in: Proceedings of the Fourth Theory of Cryptography Conference (TCC ’07), Lecture Notes in Computer Science, vol. 4392, 2007, pp. 499–514.
2. Password-based authenticated key exchange in the three-party setting;Abdalla;IEE Proceedings – Information Security,2006
3. Contributory group key exchange in the presence of malicious participants;Bresson;IET Information Security,2008
4. Refuting the security claims of Mathuria and Jain (2005) key agreement protocols;Choo;International Journal of Network Security,2008
5. K.-K. Choo, C. Boyd, Y. Hitchcock, Errors in computational complexity proofs for protocols, in: Advances in Cryptology — ASIACRYPT ’05, Lecture Notes in Computer Science, vol. 3788, 2005, pp. 624–643.