The following publications are possibly variants of this publication:
- Strongly leakage resilient authenticated key exchange, revisitedGuomin Yang, Rongmao Chen, Yi Mu 0001, Willy Susilo, Fuchun Guo, Jie Li. dcc, 87(12):2885-2911, 2019. [doi]
- Strongly Leakage-Resilient Authenticated Key ExchangeRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. iacr, 2016:308, 2016. [doi]
- Strongly Leakage-Resilient Authenticated Key ExchangeRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. ctrsa 2016: 19-36 [doi]
- Strong Authenticated Key Exchange with Auxiliary InputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. iacr, 2017:418, 2017. [doi]
- Strong authenticated key exchange with auxiliary inputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. dcc, 85(1):145-173, 2017. [doi]
- Strong Authenticated Key Exchange with Auxiliary InputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo. iacr, 2017:418, 2017. [doi]
- A note on the strong authenticated key exchange with auxiliary inputsRongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Yang Zheng. dcc, 85(1):175-178, 2017. [doi]