S. On-(newsession, P. , P. If, P. , .. .. et al., Ibn Sid: Isaac ibn Sid

F. If and . Replies, Guess the weight of the donkey, Veterinary Record, vol.161, issue.17, pp.577-577, 2007.

.. If-f-replies-;-p, Gala dinner to mark NIVA centenary, Veterinary Record, vol.160, issue.20, pp.676-676, 2007.

(. On, S. Newkey, and P. , Skydiving vet helps set new record, Veterinary Record, vol.161, issue.16, pp.538-538, 2007.

, Second-Generation Platelet Concentrates (L-PRF, A-PRF, i-PRF, i-PRF M, i-PRF+) in Cutaneous Wound Surgery of the Foot, Advance Research on Foot & Ankle, vol.2, issue.1, 2019.

I. E. Else, if k = ?, pick ? ?R {0, 1} ? , set ? := ?, and send (GetReady, sid , P) to F

P. Mark-record-sid and P. ,

, Ibn Sid: Isaac ibn Sid

P. and .. , Ibn Sid: Isaac ibn Sid

U. Send, U. Send, U. Send, U. Send, U. Send et al., OceanSITES, Proceedings of OceanObs'09: Sustained Ocean Observations and Information for Society, 2010.

. Y., ?Send me tribute, or else?,?, Notes and Queries, vol.s1-X, issue.245, pp.38-38, 1854.

F. If and . Replies, GMSC and RCGP send replies to CMO on limited list, BMJ, vol.290, issue.6466, pp.485-486, 1985.

M. Abdalla and M. Barbosa, Eprint, Cryptology ePrint Archive, 2019.

M. Abdalla, M. Barbosa, T. Bradley, S. Jarecki, J. Katz et al., Universally Composable Relaxed Password Authenticated Key Exchange, Advances in Cryptology ? CRYPTO 2020, pp.278-307, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02948678

M. Abdalla, M. Bellare, and P. Rogaway, The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, Topics in Cryptology ? CT-RSA 2001, vol.2020, pp.143-158, 2001.
URL : https://hal.archives-ouvertes.fr/hal-02391537

M. Abdalla, D. Catalano, C. Chevalier, and D. Pointcheval, Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, Topics in Cryptology ? CT-RSA 2008, vol.4964, pp.335-351, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00419157

M. Abdalla, P. A. Fouque, and D. Pointcheval, Password-Based Authenticated Key Exchange in the Three-Party Setting, Public Key Cryptography - PKC 2005, vol.3386, pp.65-84, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00918401

M. Abdalla, P. A. Fouque, and D. Pointcheval, Password-based authenticated key exchange in the three-party setting, IEE Proceedings - Information Security, vol.153, issue.1, p.27, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00918401

M. Abdalla and D. Pointcheval, Simple Password-Based Encrypted Key Exchange Protocols, Lecture Notes in Computer Science, vol.3376, pp.191-208, 2005.
URL : https://hal.archives-ouvertes.fr/hal-02391456

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, Advances in Cryptology ? EUROCRYPT 2000, vol.1807, pp.139-155, 2000.

S. M. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.72-84

V. Boyko, P. D. Mackenzie, and S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, Advances in Cryptology ? EUROCRYPT 2000, vol.1807, pp.156-171, 2000.

T. Bradley, J. Camenisch, S. Jarecki, A. Lehmann, G. Neven et al., Password-Authenticated Public-Key Encryption, Applied Cryptography and Network Security, vol.11464, pp.442-462, 2019.

R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp.136-145, 2001.

R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. Mackenzie, Universally Composable Password-Based Key Exchange, Lecture Notes in Computer Science, vol.3494, pp.404-421, 2005.

R. Gennaro, Faster and Shorter Password-Authenticated Key Exchange, Theory of Cryptography, vol.4948, pp.589-606

C. Gentry, P. Mackenzie, and Z. Ramzan, A Method for Making Password-Based Key Exchange Resilient to Server Compromise, Lecture Notes in Computer Science, vol.4117, pp.142-159, 2006.

O. Goldreich and Y. Lindell, Session-Key Generation Using Human Passwords Only, Journal of Cryptology, vol.19, issue.3, pp.241-340, 2006.

A. Groce and J. Katz, A new framework for efficient password-based authenticated key exchange, Proceedings of the 17th ACM conference on Computer and communications security - CCS '10, pp.516-525, 2010.

B. Haase and B. Labrique, AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.286, pp.1-48, 2019.

B. Haase and B. Labrique, AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol.2019, issue.2, pp.1-48, 2019.

F. Hao and S. F. Shahandashti, The SPEKE Protocol Revisited, Security Standardisation Research, vol.585, pp.26-38, 2014.

J. Y. Hwang, S. Jarecki, T. Kwon, J. Lee, J. S. Shin et al., Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange, Lecture Notes in Computer Science, vol.11035, pp.485-504, 2018.

D. P. Jablon, Extended password key exchange protocols immune to dictionary attack, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.248-255

S. Jarecki, H. Krawczyk, and J. Xu, OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks, Advances in Cryptology ? EUROCRYPT 2018, vol.10822, pp.456-486, 2018.

S. Jarecki, H. Krawczyk, and J. Xu, OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks, Advances in Cryptology ? EUROCRYPT 2018, vol.163, pp.456-486, 2018.

C. S. Jutla and A. Roy, Dual-System Simulation-Soundness with Applications to UC-PAKE and More, Advances in Cryptology -- ASIACRYPT 2015, vol.9452, pp.630-655, 2015.

J. Katz, R. Ostrovsky, and M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, Lecture Notes in Computer Science, vol.2045, pp.475-494, 2001.

J. Katz, R. Ostrovsky, and M. Yung, Forward Secrecy in Password-Only Key Exchange Protocols, Security in Communication Networks, vol.2576, pp.29-44, 2003.

J. Katz and V. Vaikuntanathan, Round-Optimal Password-Based Authenticated Key Exchange, Theory of Cryptography, vol.6597, pp.293-310, 2011.

H. Krawczyk, The OPAQUE asymmetric PAKE protocol, 2019.

H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol, Advances in Cryptology ? CRYPTO 2005, vol.3621, pp.546-566, 2005.

P. Mackenzie, More Efficient Password-Authenticated Key Exchange, Topics in Cryptology ? CT-RSA 2001, pp.361-377, 2001.

T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Advances in Cryptology ? CRYPTO ?91, vol.576, pp.129-140

D. Pointcheval and G. Wang, VTBPEKE, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp.301-312, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01471737

V. Shoup, Eprint, Cryptology ePrint Archive, 2019.