An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol
暂无分享,去创建一个
[1] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[2] Douglas R. Stinson,et al. An infinite class of counterexamples to a conjecture concerning nonlinear resilient functions , 2004, Journal of Cryptology.
[3] N. J. A. Sloane,et al. The Z4-linearity of Kerdock, Preparata, Goethals, and related codes , 1994, IEEE Trans. Inf. Theory.
[4] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[5] Manuel Blum,et al. A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..
[6] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[7] Henri Gilbert. Techniques for Low Cost Authentication and Message Authentication , 1998, CARDIS.
[8] Claus Diem,et al. The XL-Algorithm and a Conjecture from Commutative Algebra , 2004, ASIACRYPT.
[9] Magali Bardet,et al. Étude des systèmes algébriques surdéterminés. Applications aux codes correcteurs et à la cryptographie , 2004 .
[10] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..