The following publications are possibly variants of this publication:
- Strong Authenticated Key Exchange with Auxiliary InputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. iacr, 2017:418, 2017. [doi]
- Strong authenticated key exchange with auxiliary inputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. dcc, 85(1):145-173, 2017. [doi]
- Strong Authenticated Key Exchange with Auxiliary InputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. iacr, 2017:418, 2017. [doi]
- A note on the strong authenticated key exchange with auxiliary inputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Yang Zheng. dcc, 85(1):175-178, 2017. [doi]
- A general compiler for password-authenticated group key exchange protocolHui Li, Chuan-Kun Wu, Jun Sun. ipl, 110(4):160-167, 2010. [doi]
- eCK-Secure Authenticated Key Exchange against Auxiliary Input LeakageSujuan Li, Futai Zhang. cj, 65(8):2063-2072, 2022. [doi]
- Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input ModelGuomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong. ispec 2013: 204-217 [doi]
- A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT EnvironmentsMenghan Pan, Daojing He, Xuru Li, Sammy Chan, Emmanouil Panaousis, Yun Gao. ISCC 2021: 1-7 [doi]