1. Authenticated key exchange secure against dictionary attacks;Bellare,2000
2. Random oracles are practical: A paradigm for designing efficient protocols;Bellare,1993
3. Entity authentication and key distribution;Bellare,1994
4. Provably secure session key distribution: The three party case;Bellare,1995
5. Encrypted key exchange: Password-based protocols secure against dictionary attacks;Bellovin,1992