. M. Abc-+-06, E. Abdalla, O. Bresson, B. Chevassut, D. Möller et al., Provably secure passwordbased authentication in TLS, ASIACCS 06, pp.35-45, 2006.

M. Abdalla, F. Benhamouda, and P. Mackenzie, Security of the J-PAKE Password-Authenticated Key Exchange Protocol, 2015 IEEE Symposium on Security and Privacy, pp.571-587, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01175785

M. Abdalla, M. Bellare, and P. Rogaway, The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, Topics in Cryptology ? CT-RSA 2001, vol.2020, pp.143-158, 2001.
URL : https://hal.archives-ouvertes.fr/hal-02391537

M. Abdalla, P. Fouque, and D. Pointcheval, Password-Based Authenticated Key Exchange in the Three-Party Setting, Public Key Cryptography - PKC 2005, vol.3386, pp.65-84, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00918401

M. Abdalla, P. Fouque, and D. Pointcheval, Password-based authenticated key exchange in the three-party setting, IEE Proceedings - Information Security, vol.153, issue.1, p.27, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00918401

M. Abdalla and D. Pointcheval, Simple Password-Based Encrypted Key Exchange Protocols, Lecture Notes in Computer Science, vol.3376, pp.191-208, 2005.
URL : https://hal.archives-ouvertes.fr/hal-02391456

S. M. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84

J. Becerra, D. Ostrev, and M. ?krobot, Forward Secrecy of SPAKE2, Provable Security, vol.11192, pp.366-384, 2018.

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, Advances in Cryptology ? EUROCRYPT 2000, vol.1807, pp.139-155, 2000.

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security - CCS '93, pp.62-73, 1993.

M. Bellare and P. Rogaway, The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, Advances in Cryptology - EUROCRYPT 2006, pp.409-426, 2006.

G. Fuchsbauer, E. Kiltz, and J. Loss, The Algebraic Group Model and its Applications, Lecture Notes in Computer Science, vol.10992, pp.33-62, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01870015

B. Haase and B. Labrique, AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.1-48, 2019.

B. Haase and B. Labrique, AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, issue.2, pp.1-48, 2019.

F. Hao and S. F. Shahandashti, Extended password key exchange protocols immune to dictionary attacks, 6th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 1997), vol.585, pp.248-255, 1997.

J. Katz, R. Ostrovsky, and M. Yung, Forward Secrecy in Password-Only Key Exchange Protocols, Security in Communication Networks, vol.2576, pp.29-44, 2003.

J. Katz, R. Ostrovsky, and M. Yung, Efficient and secure authenticated key exchange using weak passwords, Journal of the ACM, vol.57, issue.1, pp.1-39, 2009.

H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol, Advances in Cryptology ? CRYPTO 2005, vol.3621, pp.546-566, 2005.

H. Krawczyk, Cryptographic Extraction and Key Derivation: The HKDF Scheme, Advances in Cryptology ? CRYPTO 2010, vol.6223, pp.631-648, 2010.

W. Ladd and B. Kaduk, SPAKE2, a PAKE. Internet-Draft draft-irtf-cfrg-spake2-09, IRTF, 2019.

J. Loss, New techniques for the modular analysis of digital signature schemes, 2019.

P. Mackenzie, The gap-problems: A new class of problems for the security of cryptographic schemes, PKC 2001, pp.104-118, 1992.

D. Pointcheval and J. Stern, Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, vol.13, issue.3, pp.361-396, 2000.