The following publications are possibly variants of this publication:
- A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0Qianying Zhang, Shijun Zhao, Zhiping Shi, Yong Guan, Guohui Wang. iacr, 2019:710, 2019. [doi]
- A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0Shijun Zhao, Qianying Zhang. idtrust 2015: 40-57 [doi]
- A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0Shijun Zhao, Qianying Zhang. iacr, 2015:611, 2015. [doi]