1. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
2. Fault attacks on elliptic curve cryptosystems;Alkhoraidly,2012
3. Low voltage fault attacks on the rsa cryptosystem;Barenghi,2009
4. A two-factor authentication scheme against FDM attack in IFTTT based smart home system;Baruah;Comput Secur,2018
5. An efficient cryptographic protocol verifier based on prolog rules;Blanchet,2001