A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, 2017. ,
DOI : 10.1007/978-3-319-26059-4_6
URL : https://hal.archives-ouvertes.fr/hal-01588560
Entity Authentication and Key Distribution, Advances in Cryptology -CRYPTO '93, 13th Annual International Cryptology Conference, pp.232-249, 1993. ,
DOI : 10.1007/3-540-48329-2_21
On the inherent intractability of certain coding problems (corresp.) Information Theory, IEEE Transactions on, vol.24, issue.3, pp.384-386, 1978. ,
Optimization of LPN solving algorithms Cryptology ePrint Archive, 2016. ,
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols, Progress in Cryptology ? LATINCRYPT 2012, pp.100-120, 2012. ,
DOI : 10.1007/978-3-642-33481-8_6
Practical and provably secure distance-bounding, Journal of Computer Security, vol.22, issue.301, pp.229-257, 2015. ,
DOI : 10.1145/359168.359176
Optimal Proximity Proofs, 10th International Conference, pp.170-190, 2014. ,
DOI : 10.1007/978-3-319-16745-9_10
Distance-bounding protocols (extended abstract), Proceedings of EUROCRYPT, pp.344-359, 1993. ,
Hardness Amplification of Weakly Verifiable Puzzles, Proceedings of TCC, pp.17-33, 2005. ,
DOI : 10.1007/978-3-540-30576-7_2
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06), 2006. ,
DOI : 10.1109/SECPERU.2006.10
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks, European Workshop on Security in Ad-hoc and Sensor Networks, 2006. ,
DOI : 10.1007/11964254_9
A Formal Approach to Distance-Bounding RFID Protocols, Proceedings ISC, LNCS, 2011. ,
DOI : 10.1007/3-540-46885-4_22
Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance, Proceedings of ACNS, pp.414-431, 2013. ,
DOI : 10.1007/978-3-642-38980-1_26
HB # : Increasing the Security and Efficiency of HB +, Proceedings of EUROCRYPT, pp.361-378, 2008. ,
Active attack against HB+: a provably secure lightweight authentication protocol, Electronics Letters, vol.41, issue.21, p.41, 2005. ,
DOI : 10.1049/el:20052622
Secure Human Identification Protocols, Proceedings of ASIACRYPT, volume 2248 of LNCS, pp.52-66, 2001. ,
DOI : 10.1007/3-540-45682-1_4
Authenticating Pervasive Devices with Human Protocols, Proceedings of CRYPTO, 2005. ,
DOI : 10.1007/11535218_18
The Swiss-Knife RFID Distance Bounding Protocol 19. ´ Eric Levieil and Pierre-Alain Fouque. An improved LPN algorithm, Proceedings ICISC Proceedings of SCN, 2006. ,
HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, pp.1-3, 2015. ,
DOI : 10.1145/1352533.1352566
HB+DB: Distance bounding meets human based authentication, Future Generation Computer Systems, p.2016 ,