G. Avoine, X. Bultel, S. Gambs, D. Gérault, P. Lafourcade et al., A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, 2017.
DOI : 10.1007/978-3-319-26059-4_6

URL : https://hal.archives-ouvertes.fr/hal-01588560

M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, Advances in Cryptology -CRYPTO '93, 13th Annual International Cryptology Conference, pp.232-249, 1993.
DOI : 10.1007/3-540-48329-2_21

E. Berlekamp, R. Mceliece, and H. Van-tilborg, On the inherent intractability of certain coding problems (corresp.) Information Theory, IEEE Transactions on, vol.24, issue.3, pp.384-386, 1978.

S. Bogos and S. Vaudenay, Optimization of LPN solving algorithms Cryptology ePrint Archive, 2016.

I. Boureanu, A. Mitrokotsa, and S. Vaudenay, On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols, Progress in Cryptology ? LATINCRYPT 2012, pp.100-120, 2012.
DOI : 10.1007/978-3-642-33481-8_6

I. Boureanu, A. Mitrokotsa, and S. Vaudenay, Practical and provably secure distance-bounding, Journal of Computer Security, vol.22, issue.301, pp.229-257, 2015.
DOI : 10.1145/359168.359176

I. Boureanu and S. Vaudenay, Optimal Proximity Proofs, 10th International Conference, pp.170-190, 2014.
DOI : 10.1007/978-3-319-16745-9_10

S. Brands and D. Chaum, Distance-bounding protocols (extended abstract), Proceedings of EUROCRYPT, pp.344-359, 1993.

R. Canetti, S. Halevi, and M. Steiner, Hardness Amplification of Weakly Verifiable Puzzles, Proceedings of TCC, pp.17-33, 2005.
DOI : 10.1007/978-3-540-30576-7_2

J. Bringer, H. Chabanne, and E. Dottax, HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06), 2006.
DOI : 10.1109/SECPERU.2006.10

J. Clulow, P. Gerhard, . Hancke, G. Markus, T. Kuhn et al., So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks, European Workshop on Security in Ad-hoc and Sensor Networks, 2006.
DOI : 10.1007/11964254_9

U. Dürholz, M. Fischlin, M. Kasper, and C. Onete, A Formal Approach to Distance-Bounding RFID Protocols, Proceedings ISC, LNCS, 2011.
DOI : 10.1007/3-540-46885-4_22

M. Fischlin and C. Onete, Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance, Proceedings of ACNS, pp.414-431, 2013.
DOI : 10.1007/978-3-642-38980-1_26

H. Gilbert, M. Robshaw, and Y. Seurin, HB # : Increasing the Security and Efficiency of HB +, Proceedings of EUROCRYPT, pp.361-378, 2008.

H. Gilbert, M. Robshaw, and H. Sibert, Active attack against HB+: a provably secure lightweight authentication protocol, Electronics Letters, vol.41, issue.21, p.41, 2005.
DOI : 10.1049/el:20052622

N. Hopper and M. Blum, Secure Human Identification Protocols, Proceedings of ASIACRYPT, volume 2248 of LNCS, pp.52-66, 2001.
DOI : 10.1007/3-540-45682-1_4

A. Juels and S. A. Weis, Authenticating Pervasive Devices with Human Protocols, Proceedings of CRYPTO, 2005.
DOI : 10.1007/11535218_18

C. H. Kim, G. Avoine, F. Koeune, F. X. Standaert, and O. Pereira, The Swiss-Knife RFID Distance Bounding Protocol 19. ´ Eric Levieil and Pierre-Alain Fouque. An improved LPN algorithm, Proceedings ICISC Proceedings of SCN, 2006.

E. Pagnin, A. Yang, G. Hancke, and A. Mitrokotsa, HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, pp.1-3, 2015.
DOI : 10.1145/1352533.1352566

E. Pagnin, A. Yang, Q. Hu, G. Hancke, and A. Mitrokotsa, HB+DB: Distance bounding meets human based authentication, Future Generation Computer Systems, p.2016