1. Modelling after-the-fact leakage for key exchange;Alawatugoda;IACR Cryptology ePrint Archive,2014
2. Authenticated key exchange secure against dictionary attacks;Bellare,2000
3. Entity authentication and key distribution;Bellare,1993
4. Provably secure session key distribution: the three party case;Bellare,1995
5. One-round key exchange with strong security: an efficient and generic construction in the standard model;Bergsma,2015