Unconditional security techniques may represent an advantageous alternative … when the number of authentications needed during the … 2 scalar products among binary vectors which are … 10 to 20 bits per authentication), and provide … [p. 185] We assume that the cards or devices … … for the life time of the card key …
Google-1
Google-2
Copyright clearance needed for quotation.