[1]HOPPER N J,BLUM M.Secure human identification protocols[C]//Proceedings of ASIACRYPT’01.Berlin,Germany:Springer,2001:52-66.
[2]JUELS A,WEIS S A.Authenticating pervasive devices with human protocols[C]//Proceedings of CRYPTO’05.Berlin,Germany:Springer,2005:293-308.
[3]陈剑,张春.低功耗RFID的公钥密码系统实现[J].半导体技术,2009(9):890-894.
[4]夏永祥,史志才,张瑜,等.一种基于轻权加密体制的RFID认证协议[J].计算机工程,2014,40(7):69-72.
(下转第152页)
(上接第144页)
[5]KATZ J,SHIN J S,SMITH A.Parallel and concurrent security of the HB and HB+protocols[J].Journal of Cryptology,2010,23(3):402-421.
[6]GIBERT H,ROBSHAW M,SIBERT H.Active attack against HB+:a provably secure lightweight authentication protocol[J].Electronics Letters,2005,41:1169-1170.
[7]KILTZ E,PIETRZAK K,CASH D,et al.Efficient authentication from hard learning problems[C]//Proceedings of EUROCRYPT’11.Berlin,Germany:Springer,2011:7-26.
[8]HEYSE S,KILTZ E,LYUBASHEVSKY V,et al.Lapin:an efficient authentication protocol based on ring-LPN[C]//Proceedings of Conference on Fast Software Encryption.Berlin,Germany:Springer,2012:346-365.
[9]LYUBASHEVSKY V,MASNY D.Man-in-the-middle secure authentication schemes from LPN and weak PRFs[C]//Proceedings of CRYPTO’13.Berlin,Germany:Springer,2013:308-325.
[10]CASH D,KILTZ E,TESSARO S.Two-round man-in-the-middle security from LPN[C]//Proceedings of Theory of Cryptography Conference.Berlin,Germany:Springer,2016:225-248.
[11]DAMGARD I,PARK S.Ubiquitous authentication definitions attacks and constructions[EB/OL].[2017-07-10].http://people.csail.mit.edu/sunoo/p/ubiauth.pdf.
[12]SKOROBOGATOV S P,ANDERSON R J.Optical fault induction attacks[C]//Proceedings of CHES’02.Berlin,Germany:Springer,2002:2-12.
[13]赵峰,王发强,郑力明,等.量子密钥分发误码协调算法分析[J].计算机工程,2007,33(12):22-24.
[14]李启南,李娇,武让.基于双重零水印的数据库版权保护[J].计算机工程.2012,38(8):107-110.
[15]LING S,XING C.Coding theory,a first course[M].Cambridge,UK:Cambridge University Press,2004. |