Relay attacks pose a serious security threat to wireless systems, such as, contactless payment keyless entry or smart access control systems. Distance bounding protocols, which allow an entity not only authenticate another but also determine whether it is physically close by, effectively mitigate relay attacks. However, secure implementation of distance especially the time critical challenge-re...