{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:03:58Z","timestamp":1725584638237},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210396"},{"type":"electronic","value":"9783642210402"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21040-2_17","type":"book-chapter","created":{"date-parts":[[2011,6,3]],"date-time":"2011-06-03T01:11:43Z","timestamp":1307063503000},"page":"244-253","source":"Crossref","is-referenced-by-count":2,"title":["Practical Attacks on HB and HB+ Protocols"],"prefix":"10.1007","author":[{"given":"Zbigniew","family":"Go\u0142\u0119biewski","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Majcher","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Zag\u00f3rski","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Zawada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques","year":"2005","unstructured":"Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.): APPROX 2005 and RANDOM 2005. LNCS, vol.\u00a03624. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Trans. Info. Theory, 384\u2013386 (1978)","key":"17_CR2","DOI":"10.1109\/TIT.1978.1055873"},{"issue":"4","key":"17_CR3","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1145\/792538.792543","volume":"50","author":"A. Blum","year":"2003","unstructured":"Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM\u00a050(4), 506\u2013519 (2003)","journal-title":"Journal of the ACM"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-04391-8_23","volume-title":"Biometric ID Management and Multimodal Communication","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Kevenaar, T.A.M., Kindarji, B.: Extending match-on-card to local biometric identification. In: Fierrez, J., Ortega-Garcia, J., Esposito, A., Drygajlo, A., Faundez-Zanuy, M. (eds.) BioID MultiComm2009. LNCS, vol.\u00a05707, pp. 178\u2013186. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Cichon, J., Klonowski, M., Kutylowski, M.: Privacy protection for rfid with hidden subset identifiers. Pervasive Computing (2008)","key":"17_CR5","DOI":"10.1007\/978-3-540-79576-6_18"},{"unstructured":"Frumkin, D., Shamir, A.: Un-trusted-hb: Security vulnerabilities of trusted-hb. Cryptology ePrint Archive, Report 2009\/044 (2009)","key":"17_CR6"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1049\/el:20052622","volume":"41","author":"H. Gilbert","year":"2005","unstructured":"Gilbert, H., Sibert, H., Robshaw, M.: An active attack against a provably secure lightweight authentication protocol. IEEE Electronic Letters\u00a041, 1169\u20131170 (2005)","journal-title":"IEEE Electronic Letters"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85230-8_12","volume-title":"Financial Cryptography and Data Security","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Good variants of hB\u2009+\u2009 are hard to find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol.\u00a05143, pp. 156\u2013170. Springer, Heidelberg (2008)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J.B., Seurin, Y.: Hb# Increasing the security and efficiency of hb\u2009+\u2009. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-540-85209-4_19","volume-title":"Ad-hoc, Mobile and Wireless Networks","author":"Z. Golebiewski","year":"2008","unstructured":"Golebiewski, Z., Majcher, K., Zag\u00f3rski, F.: Attacks on CKK family of RFID authentication protocols. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds.) ADHOC-NOW 2008. LNCS, vol.\u00a05198, pp. 241\u2013250. Springer, Heidelberg (2008)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 52. Springer, Heidelberg (2001)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11832072_24","volume-title":"Security and Cryptography for Networks","author":"\u00c9. Levieil","year":"2006","unstructured":"Levieil, \u00c9., Fouque, P.-A.: An improved LPN algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 348\u2013359. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: APPROX-RANDOM [1], pp. 378\u2013389","key":"17_CR14","DOI":"10.1007\/11538462_32"},{"issue":"9","key":"17_CR15","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: Hb-mp: A further step in the hb-family of lightweight authentication protocols. Comput. Netw.\u00a051(9), 2262\u20132267 (2007)","journal-title":"Comput. Netw."},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"K. Ouafi","year":"2008","unstructured":"Ouafi, K., Overbeck, R., Vaudenay, S.: On the security of hB# against a man-in-the-middle attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 108\u2013124. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21040-2_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:17:19Z","timestamp":1619774239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21040-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210396","9783642210402"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21040-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}