1 |
H. Gilbert, M. Robshaw and Y. Seurin, "An active attack against HB+- a probably secure lightweight authentication protocol," Electronics letters, vol. 41, pp.1169-1170, 2005.
DOI
|
2 |
H. Seo and H. Kim, "Lightweight cryptographic algorithm implementations for Internet of Things," Review of The Korea Institute of information Security & Cryptology, 25(2), pp.12-17, 2015.
|
3 |
E. Haselsteiner and K. Breitfuss, "Security in near field communication, strengths and weaknesses," Workshop on RFID Security Security RFIDSec, Jul. 2006.
|
4 |
A. Juels and S.A. Weis, "Authenticating pervasive devices with human protocols," Crypto, LNCS, vol.3621, pp. 293-308, Aug. 2005.
|
5 |
N.J. Hopper and M. Blum, "Secure human identification protocols," Asiacrypt, LNCS, vol.2248, p.52, Dec. 2001.
|
6 |
A. Blum, A. Kalai, and H. Wasserman, "Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model," Journal of the ACM 50, 4, pp.506-519, 2003.
DOI
|
7 |
J. Katz and J.S. Shin, "Parallel and concurrent security of the HB and HB+ protocols," Eurocrypt, LNCS, vol. 4004, pp.73-87, May. 2006.
|