1. N.J. Hopper, M. Blum, Secure human identification protocols, in: Proc. of ASIACRYPT, 2001, pp. 52–66.
2. Authenticating pervasive devices with human protocols;Juels,2005
3. On the inherent intractability of certain coding problems (corresp.);Berlekamp;IEEE Trans. Inform. Theor.,1978
4. Active attack against HB+: a provably secure lightweight authentication protocol;Gilbert;Electron. Lett.,2005
5. J. Bringer, H. Chabanne, E. Dottax, HB++: a Lightweight authentication protocol secure against some attacks, in: Proc. of Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU, 2006, pp. 28–33.