On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, p.384386, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Noise-tolerant learning, the parity problem, and the statistical query model, In Journal of the ACM, vol.50, issue.4, p.519, 2003. ,
DOI : 10.1145/335305.335355
URL : http://arxiv.org/abs/cs/0010022
Extending match-on-card to local biometric identication, COST 2101, p.2102 ,
DOI : 10.1007/978-3-642-04391-8_23
Privacy protection for rd with hidden subset identiers, Pervasive Computing, 2008. ,
Un-trusted-hb: Security vulnerabilities of trusted-hb. Cryptology ePrint Archive, Report, p.44, 2009. ,
Active attack against HB+: a provably secure lightweight authentication protocol, IEEE Electronic Letters 41, pp.1169-1170, 2005. ,
DOI : 10.1049/el:20052622
Good variants of hb + are hard to nd, Lecture Notes in Computer Science, vol.5143, p.156170, 2008. ,
Hb # : Increasing the security and eciency of hb +, EUROCRYPT, p.361378, 2008. ,
Attacks on ckk family of rd authentication protocols, Lecture Notes in Computer Science, vol.5198, p.241250, 2008. ,
Secure human identication protocols, Lecture Notes in Computer Science, 2001. ,
Authenticating Pervasive Devices with Human Protocols, 2005. ,
DOI : 10.1007/11535218_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.2014
An Improved LPN Algorithm, Lecture Notes in Computer Science, vol.4116, p.348359, 2006. ,
DOI : 10.1007/11832072_24
URL : https://hal.archives-ouvertes.fr/inria-00563959
The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem, In APPROX-RANDOM, issue.1, p.378389 ,
DOI : 10.1007/11538462_32
HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Networks, vol.51, issue.9, p.22622267, 2007. ,
DOI : 10.1016/j.comnet.2007.01.011
On the security of hb# against a man-in-the-middle attack, Lecture Notes in Computer Science, vol.5350, p.108124, 2008. ,