1. Robust distributed multiplication without interaction;Abe,1999
2. Authenticated key exchange secure against dictionary attacks;Bellare,2000
3. Encrypted key exchange: Password based protocols secure against dictionary attacks;Bellovin,1992
4. The decision Diffie–Hellman problem;Boneh,1998
5. Provably secure password-authenticated key exchange using Diffie–Hellman;Boyko,2000