The following publications are possibly variants of this publication:
- Continuous After-the-Fact Leakage-Resilient Key ExchangeJanaka Alawatugoda, Colin Boyd, Douglas Stebila. acisp 2014: 258-273 [doi]
- On the Leakage-Resilient Key ExchangeJanaka Alawatugoda. iacr, 2016:32, 2016. [doi]
- On the leakage-resilient key exchangeJanaka Alawatugoda. jmc, 11(4):215-269, 2017. [doi]
- Continuous After-the-fact Leakage-Resilient Key Exchange (full version)Janaka Alawatugoda, Colin Boyd, Douglas Stebila. iacr, 2014:264, 2014. [doi]
- Continuous After-the-fact Leakage-Resilient eCK-secure Key ExchangeJanaka Alawatugoda, Colin Boyd, Douglas Stebila. iacr, 2015:335, 2015. [doi]
- Continuous After-the-Fact Leakage-Resilient eCK-Secure Key ExchangeJanaka Alawatugoda, Douglas Stebila, Colin Boyd. ima 2015: 277-294 [doi]
- Review on Leakage Resilient Key Exchange Security ModelZheng Wei Clement Chan, Chuah Chai Wen, Janaka Alawatugoda. ijcnis, 11(1), 2019. [doi]