{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:39:35Z","timestamp":1756384775827},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tit.2013.2253892","type":"journal-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T18:07:39Z","timestamp":1363802859000},"page":"4042-4054","source":"Crossref","is-referenced-by-count":13,"title":["Secure and Efficient LCMQ Entity Authentication Protocol"],"prefix":"10.1109","volume":"59","author":[{"given":"Zhijun","family":"Li","sequence":"first","affiliation":[]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","first-page":"267","volume":"lncs 2567","author":"akkar","year":"2002","journal-title":"Public Key Cryptography 2003"},{"key":"ref33","author":"garey","year":"1979","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/qmath\/37.1.27"},{"key":"ref31","author":"rivest","year":"2009","journal-title":"On the Invertibility of the XOR of Rotations of a Binary Word"},{"key":"ref30","volume":"20","author":"lidl","year":"1983","journal-title":"Finite Fields"},{"key":"ref37","first-page":"206","volume":"lncs 1592","author":"kipnis","year":"1999","journal-title":"Advances in Cryptology?EUROCRYPT 99"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(80)90134-9"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/11761679_8","volume":"lncs 4004","author":"berbain","year":"2006","journal-title":"Advances in CryptologyEUROCRYPT 2006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"ref11","author":"crawford","year":"1995","journal-title":"The minimal disagreement parity problem as a hard satisfiability problem"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258536"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/792538.792543"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/11941378_5","volume":"lncs 4329","author":"fossorier","year":"2006","journal-title":"Progress in Cryptology?INDOCRYPT 2006"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/11832072_24","volume":"lncs 4116","author":"levieil","year":"2006","journal-title":"Security and Cryptography for Networks"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume":"lncs 2248","author":"hopper","year":"2001","journal-title":"Advances in Crypto 2001"},{"key":"ref18","author":"katz","year":"2006","journal-title":"Analyzing the HB and Protocols in the Large Error Case"},{"key":"ref19","author":"gilbert","year":"2005","journal-title":"An Active Attack Against A Provably Secure Lightweight Authentication Protocol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2010.5649666"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-540-71039-4_9","article-title":"SQUASH&#x2014;A new MAC with provable security properties for highly constrained devices such as RFID tags","author":"shamir","year":"2008","journal-title":"Proc Int Workshop Fast Softw Encrypt"},{"key":"ref27","article-title":"Un-trusted-HB: Security vulnerabilities of trusted-HB","author":"frumkin","year":"2009","journal-title":"Workshop on RFID Security"},{"key":"ref3","author":"gilbert","year":"2008","journal-title":"Advances in CryptologyEUROCRYPT 2008"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/11761679_6","volume":"lncs 4004","author":"katz","year":"2006","journal-title":"Advances in CryptologyEUROCRYPT 2006"},{"key":"ref29","author":"golomb","year":"2004","journal-title":"Signal Design for Good Correlation For Wireless Communication Cryptography and Radar"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1007\/11833529_93","volume":"lncs 4159","author":"peris-lopez","year":"2006","journal-title":"Ubiquitous Intelligence and Computing"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-642-01001-9_17","author":"ouafi","year":"2009","journal-title":"Advances in Cryptology?Eurocrypt 2009"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume":"lncs 5350","author":"ouafi","year":"2008","journal-title":"Advances in CryptologyASIACRYPT 2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928290"},{"key":"ref9","author":"macwilliams","year":"1977","journal-title":"The Theory of Error-Correcting Codes"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume":"lncs 3621","author":"juels","year":"2005","journal-title":"Advances in CryptologyCRYPTO 2005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPERU.2006.10"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.01.011"},{"key":"ref21","article-title":"Securing <formula formulatype=\"inline\"> <tex Notation=\"TeX\">${\\rm HB}^{+}$<\/tex><\/formula> against GRS man-in-the-middle attack","author":"duc","year":"2007","journal-title":"Symp Cryptogr Inf Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519342"},{"key":"ref23","article-title":"HB and related lightweight authentication protocols for secure RFID tag\/reader authentication","author":"piramuthu","year":"2006","journal-title":"CollECTeR Eur Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_21"},{"key":"ref25","author":"gilbert","year":"2008","journal-title":"Financial Cryptography and Data Security"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6516641\/06482632.pdf?arnumber=6482632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:47:46Z","timestamp":1638218866000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6482632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":38,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tit.2013.2253892","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}