1. Abyaneh, M.R.S.: On the security of non-linear HB (NLHB) protocol against passive attack. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 523–528. IEEE (2010)
2. Balachandran, G.K., Barnett, R.E.: A 440-nA true random number generator for passive RFID tags. IEEE Trans. Circ. Syst. I: Regular Pap. 55(11), 3723–3732 (2008)
3. Bosley, C., Haralambiev, K., Nicolosi, A.: HB $$^{N}$$ : An HB-like protocol secure against man-in-the-middle attacks. IACR Cryptology ePrint Archive 2011, p. 350 (2011)
4. Bringer, J., Chabanne, H.:. Trusted-HB: A low-cost version of HB $$^{+}$$ secure against man-in-the-middle attacks. arXiv preprint (2008). arXiv:0802.0603
5. Bringer, J., Chabanne, H., Dottax, E.: HB $$^{++}$$ : A lightweight authentication protocol secure against some attacks. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006, SecPerU 2006, pp. 28–33. IEEE (2006)