The following publications are possibly variants of this publication:
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key ExchangeMark Manulis, Koutarou Suzuki, Berkant Ustaoglu. ieicet, 96-A(1):101-110, 2013. [doi]
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysAtsushi Fujioka, Koutarou Suzuki. ctrsa 2011: 121-141 [doi]
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key ExchangeAtsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu. acisp 2012: 15-28 [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. ieicet, 94-A(6):1306-1317, 2011. [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. IWSEC 2010: 164-180 [doi]
- Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. wisa 2011: 15-30 [doi]