[1]BLUM A,FURST M,KEARNS M,et al.Cryptographic primitives based on hard learning problems[C]//Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptolog.Berlin,Germany:Springer,1993:278-291.
[2]HOPPER N J,BLUM M.Secure human identification protocols[C]//Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Berlin,Germany:Springer,2001:52-66.
[3]JUELS A,WEIS S A.Authenticating pervasive devices with human protocols[C]//Proceedings of the 25th Annual International Conference on Advances in Cryptology.Berlin,Germany:Springer,2005:293-308.
[4]BRINGER J,CHABANNE H.Trusted-HB:a low-cost version of HB+ secure against man-in-the-middle attacks [J].IEEE Transactions on Information Theory,2008,54(9):4339-4342.
[5]GILBERT H,ROBSHAW M J,SEURIN Y.Good variants of HB+ are hard to find[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2008:156-170.
[6]GILBERT H,ROBSHAW M J B,SEURIN Y.HB#:increasing the security and efficiency of HB+[C]//Proceedings of the 27th Annual International Conference on Advances in Cryptology.Berlin,Germany:Springer,2008:361-378.
[7]OUAFI K,OVERBECK R,VAUDENAY S.On the security of HB# against a man-in-the-middle attack[C]//Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security:Advances in Cryptology.Berlin,Germany:Springer,2008:108-124.
[8]KILTZ E,PIETRZAK K,CASH D,et al.Efficient authentication from hard learning problems[C]//Proceedings of International Conference on Theory and Applications of Cryptographic Techniques:Advances in Cryptology.Berlin,Germany:Springer,2011:7-26.
[9]LYUBASHEVSKY V,MASNY D.Man-in-the-middle secure authentication schemes from LPN and weak PRFs[C]//Proceedings of the 33rd Annual Cryptology Conference:Advances in Cryptology.Berlin,Germany:Springer,2013:308-325.
[10]CASH D,KILTZ E,TESSARO S.Two-round man-in-the-middle security from LPN[C]//Proceedings of Theory of Cryptography Conference.Berlin,Germany:Springer,2016:225-248.
[11]EPC compliant class-1 generation-2 UHF RFID devices conformance requirement[EB/OL].[2017-12-15].https://www.gs1.org/docs/epc/Gen2_conformance_requirements.pdf.
[12]姜晓,马昌社.基于LPN抗中间人攻击的两轮认证协议[J].华南师范大学学报(自然科学版),2016,48(3):64-68.
[13]BERLEKAMP E,MCELIECE R,TILBORG H V.On the inherent intractability of certain coding problems (Corresp.)[J].IEEE Transactions on Information Theory,1978,24(3):384-386.
[14]DODIS Y,KILTZ E,PIETRZAK K,et al.Message authentication,revisited[C]//Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques.Berlin,Germany:Springer,2012:355-374.
[15]RIZOMILIOTIS P,GRITZALIS S.On the security of AUTH,a provably secure authentication protocol based on the subspace LPN problem[J].International Journal of Information Security,2013,12(2):151-154. |