1. Interaction in key distribution schemes;Beimel,1994
2. Systematic design of two-party authentication protocols;Bird,1991
3. An optimal class of symmetric key generation systems;Blom,1984
4. Space requirements for broadcast encryption;Blundo,1994
5. Perfectly secure key distribution for dynamic conferences;Blundo,1992