E. R. Berlekamp, R. J. Mceliece, and H. C. Van-tilborg, On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, p.384386, 1978.
DOI : 10.1109/TIT.1978.1055873

A. Blum, A. Kalai, and H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model, In Journal of the ACM, vol.50, issue.4, p.519, 2003.
DOI : 10.1145/335305.335355

URL : http://arxiv.org/abs/cs/0010022

J. Bringer, H. Chabanne, T. A. Kevenaar, and B. Kindarji, Extending match-on-card to local biometric identication, COST 2101, p.2102
DOI : 10.1007/978-3-642-04391-8_23

J. Cichon, M. Klonowski, and M. Kutylowski, Privacy protection for rd with hidden subset identiers, Pervasive Computing, 2008.

D. Frumkin and A. Shamir, Un-trusted-hb: Security vulnerabilities of trusted-hb. Cryptology ePrint Archive, Report, p.44, 2009.

H. Gilbert, H. Sibert, and M. Robshaw, Active attack against HB+: a provably secure lightweight authentication protocol, IEEE Electronic Letters 41, pp.1169-1170, 2005.
DOI : 10.1049/el:20052622

H. Gilbert, M. J. Robshaw, and Y. Seurin, Good variants of hb + are hard to nd, Lecture Notes in Computer Science, vol.5143, p.156170, 2008.

H. Gilbert, M. J. Robshaw, and Y. Seurin, Hb # : Increasing the security and eciency of hb +, EUROCRYPT, p.361378, 2008.

Z. Golebiewski, K. Majcher, and F. Zagórski, Attacks on ckk family of rd authentication protocols, Lecture Notes in Computer Science, vol.5198, p.241250, 2008.

J. Nicholas, M. Hopper, and . Blum, Secure human identication protocols, Lecture Notes in Computer Science, 2001.

A. Juels and S. A. Weis, Authenticating Pervasive Devices with Human Protocols, 2005.
DOI : 10.1007/11535218_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.2014

É. Levieil and P. Fouque, An Improved LPN Algorithm, Lecture Notes in Computer Science, vol.4116, p.348359, 2006.
DOI : 10.1007/11832072_24

URL : https://hal.archives-ouvertes.fr/inria-00563959

V. Lyubashevsky, The Parity Problem in the Presence of Noise, Decoding Random Linear Codes, and the Subset Sum Problem, In APPROX-RANDOM, issue.1, p.378389
DOI : 10.1007/11538462_32

J. Munilla and A. Peinado, HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Networks, vol.51, issue.9, p.22622267, 2007.
DOI : 10.1016/j.comnet.2007.01.011

K. Oua, R. Overbeck, and S. Vaudenay, On the security of hb# against a man-in-the-middle attack, Lecture Notes in Computer Science, vol.5350, p.108124, 2008.