References
- M. Bellare and P. Rogaway, "Provably secure session key distribution-the three party case", ACM symposium in theory of computing, 1995.
- M. Bellare and P. Rogaway, "Entity authentication and key distribution", In proceedings of Crypto 1993, LNCS Vol. 773, pp. 232-249. Springer-Verlag, 1994.
- M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In proceedings of Eurocrypt 2000, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
- S. Blake-Wilson, D. Jhonson, and A. Menezes, "Key agreement protocols and their security analysis", In proceedings of IMA international conference, LNCS Vol. 1361, pp. 30-45, Springer-Verlag, 1997.
- K.-K.R. Choo C. Boyd and Y. Hitchcock, Examining Indistinguishability complexity proofs for protocols, Advances in Cryptology, Asiacrypt'05, LNCS 3788, pp. 624-643, Springer-Verlag, 2005
- R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels, Advances in Cryptology, Eurocrypt'01, pp. 453-474, Springer-verlag, 2001.
- S. Chatterjee, A. Menezes, B. Ustaoglu, "Reusing static keys in key agreement protocols", Indocrypt'09, LNCS 5922, pp. 39-56, Springer-Verlag, 2009.
- B. LaMacchia, K. Lauter and A. Mityagin, "Stronger security of authenticated key exchange", ProvSec'07, LNCS 4784, pp. 1-16, Springer-Verlag, 2007.
- H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol", Advances in Cryptology, Crypto'05, LNCS 3621, pp. 546-566, Springer-Verlag, 2005.