1. Hopper, N. J., & Blum, M. (2001). Secure human identification protocols. In Cryptology-ASIACRYPT 2001, Lecture Notes in Computer Science (Vol. 2248, pp. 52–66).
2. Juels, A., & Weis, S. (2005). Authenticating pervasive devices with human protocols. In Cryptology-ASIACRYPT 2005, Lecture Notes in Computer Science (Vol. 3621, pp. 293–308).
3. Gilbert, H., Robshaw, M., & Silbert, H. (2005). An active attack against $${\rm HB}^+$$-a provable secure lightweighted authentication protocol. Cryptology ePrint archive, report 2005/237.
http://eprint.iacr.org
. Accessed 14 Feb 2019.
4. Bringer, J., Chabanne, H., Dottax, E., & Chabanne, H. (2006). $${\rm HB}^{++}$$: A lightweight authentication protocol secure against some attacks. In Proceedings of the second international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU06) (pp. 28–33).
5. Duc, D. N., & Kim, K. (2007). Securing $${\rm HB}^+$$ against GRS man-in-the-middle attack. In Institute of Electronics. Information and Communication Engineers, Symposium on Cryptography and Information Security, Jan 23–26 2007.