2014
DOI: 10.1007/s11277-014-1699-x
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Analysis of Tree-LSHB+ Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…In parallel, improved successors of HB-MP were introduced: HB-MP+ [15], HB-MP++ [16], HB-MP* [17]. The HB family also includes Trusted-HB [18], NLHB [19], HB N [20], and GHB# [21], as well as HB+PUF [22], PUF-HB [23], and Tree-LSHB [24,25]. Avoine et al [1] emphasize that the OOV attack remains one of the keystones in the analysis of any new HB-like authentication scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In parallel, improved successors of HB-MP were introduced: HB-MP+ [15], HB-MP++ [16], HB-MP* [17]. The HB family also includes Trusted-HB [18], NLHB [19], HB N [20], and GHB# [21], as well as HB+PUF [22], PUF-HB [23], and Tree-LSHB [24,25]. Avoine et al [1] emphasize that the OOV attack remains one of the keystones in the analysis of any new HB-like authentication scheme.…”
Section: Introductionmentioning
confidence: 99%