1. [1] M. Bellare and P. Rogaway, “Entity authentication and key distribution,” ed. D.R. Stinson, CRYPTO'93, LNCS, vol.773, pp.232-249, Springer, Heidelberg, 1994.
2. [2] S. Blake-Wilson, D. Johnson, and A. Menezes, “Key agreement protocols and their security analysis,” ed. M. Darnell, IMA CC'97, LNCS, vol.1355, pp.30-45, Springer, Heidelberg, 1997.
3. [3] R. Canetti and H. Krawczyk, “Analysis of key-exchange protocols and their use for building secure channels,” ed. B. Pfitzmann, EUROCRYPT 2001, LNCS, vol.2045, pp.453-474, Springer, Heidelberg, 2001.
4. [4] B. LaMacchia, K. Lauter, and A. Mityagin, “Stronger security of authenticated key exchange,” ed. W. Susilo, J.K. Liu, and Y. Mu, ProvSec 2007, LNCS, vol.4784, pp.1-16, Springer, Heidelberg, 2007.
5. [5] W. Diffie and M.E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, 1976.