A modular approach to the design and analysis of authentication and key exchange protocols,” (1998)

by M Bellare, R Canetti, H Krawczyk
Venue:in Proceedings of 30th Annual Symposium on the Theory of Computing. ACM,