O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," Journal of the ACM, vol. 33, pp. 210-217, 1986. |
T. Leighton and S. Micali, "Secret-Key Agreement without Public-Key Crpytography," Advances in Cryptology-Crypto '93, pp. 456-479, 1993. |
R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, vol. 21, pp. 993-999, 1978. |
M. Bellare, P. Rogaway, "Provably Secure Session Key Distribution--The Three Party Case," 27th Annual ACM Symposium on Theory of Computing, pp. 57-66, 1995. |