1. Interactive Diffie–Hellman assumptions with applications to password-based authentication;Abdalla,2005
2. Simple password-based encrypted key exchange protocols;Abdalla,2005
3. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
4. Protocols for Authentication and Key Establishment;Boyd,2003
5. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol;Byun,2006