U.S. patent 5,241,599, owned by Lucent, describes the initial EKE method. It expired in October 2011. U.S. patent 5,440,635, owned by Lucent, describes the augmented EKE method. It expired in August 2013.
S. M. Bellovin; M. Merritt (May 1992). "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks" (PDF). Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, Oakland. https://www.cs.columbia.edu/~smb/papers/neke.pdf ↩
S. M. Bellovin; M. Merritt (November 1993). "Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise" (PDF). Proceedings of the 1st ACM Conference on Computer and Communications Security. ACM Press. pp. 244–250. https://www.cs.columbia.edu/~smb/papers/aeke.pdf ↩
Y. Sheffer; G. Zorn; H. Tschofenig; S. Fluhrer (February 2011), An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol. http://tools.ietf.org/html/rfc6124 ↩