A modular approach to the design and analysis ofauthentication and key exchange protocols (1998)

by M Bellare, R Canetti, H Krawczyk
Venue:Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM