-
1
-
-
0000860767
-
"Security-related comments regarding McEliece's public-key cryptosystem"
-
C. M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," in Proc. Adv. Crypt. - CRYPTO, 1987, pp. 224-228.
-
(1987)
Proc. Adv. Crypt. - CRYPTO
, pp. 224-228
-
-
Adams, C.M.1
Meijer, H.2
-
2
-
-
0024627373
-
"Security-related comments regarding McEliece's public-key cryptosystem"
-
C. M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," IEEE Trans. Inf. Theory, vol. 35, pp. 454-455, 1989.
-
(1989)
IEEE Trans. Inf. Theory
, vol.35
, pp. 454-455
-
-
Adams, C.M.1
Meijer, H.2
-
3
-
-
14844335721
-
"Reusable cryptographic fuzzy extractors"
-
X. Boyen, "Reusable cryptographic fuzzy extractors," in Proc. ACM Conf. Comput. Commun. Sec., 2004, pp. 82-91.
-
(2004)
Proc. ACM Conf. Comput. Commun. Sec.
, pp. 82-91
-
-
Boyen, X.1
-
4
-
-
24944501364
-
"Secure remote authentication using biometric data"
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, "Secure remote authentication using biometric data," in Proc. Adv. Crypt. - EUROCRYPT, 2005, pp. 147-163.
-
(2005)
Proc. Adv. Crypt. - EUROCRYPT
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
5
-
-
0031675932
-
"A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511"
-
A. Canteaut and F. Chabaud, "A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511," IEEE Trans. Inf. Theory, vol. 44, pp. 367-378, 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
6
-
-
33646061716
-
"The wire-tap channel applied to biometrics"
-
Parma, Italy, Oct. 10-13
-
G. Cohen and G. Zémor, "The wire-tap channel applied to biometrics," in Proc. ISITA2004, Parma, Italy, Oct. 10-13, 2004.
-
(2004)
Proc. ISITA2004
-
-
Cohen, G.1
Zémor, G.2
-
7
-
-
5044245853
-
"Generalized coset schemes for the wire-tap channel: Application to biometric"
-
Chicago, IL, Jun. 27-Jul. 2
-
G. Cohen and G. Zémor, "Generalized coset schemes for the wire-tap channel: Application to biometric," in Proc. IEEE Int. Symp. Inf. Theory, Chicago, IL, Jun. 27-Jul. 2 2004.
-
(2004)
Proc. IEEE Int. Symp. Inf. Theory
-
-
Cohen, G.1
Zémor, G.2
-
8
-
-
0031651014
-
"On enabling secure applications through offline biometric identification"
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through offline biometric identification," in Proc. IEEE Symp. Sec. Priv., 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Sec. Priv.
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
9
-
-
35048865463
-
"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data"
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Crypt. - EUROCRYPT 2004, pp. 523-540.
-
(2004)
Proc. Adv. Crypt. - EUROCRYPT
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
10
-
-
0037265447
-
"Hardness of approximating the minimum distance of a linear code"
-
I. Dumer, D. Micciancio, and M. Sudan, "Hardness of approximating the minimum distance of a linear code," IEEE Trans. Inf. Theory, vol. 49, pp. 22-37, 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, pp. 22-37
-
-
Dumer, I.1
Micciancio, D.2
Sudan, M.3
-
11
-
-
0035747783
-
"Error-tolerant password recovery"
-
Philadelphia, PA, Nov. 6-8
-
N. Frykholm and A. Juels, "Error-tolerant password recovery" in Proc. ACM Conf. Comput. Commun. Sec., Philadelphia, PA, Nov. 6-8, 2001, pp. 1-9.
-
(2001)
Proc. ACM Conf. Comput. Commun. Sec.
, pp. 1-9
-
-
Frykholm, N.1
Juels, A.2
-
12
-
-
0036794609
-
"On the complexity of some cryptographic problems based on the general decoding problem"
-
T. Johansson and F. Jönsson, "On the complexity of some cryptographic problems based on the general decoding problem," IEEE Trans. Inf. Theory, vol. 48, pp. 2669-2678, 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, pp. 2669-2678
-
-
Johansson, T.1
Jönsson, F.2
-
15
-
-
85034651324
-
"An observation on the security of McEliece's public-key cryptosystem"
-
Davos, Switzerland, May 25-27
-
P. J. Lee and E. F. Brickell, "An observation on the security of McEliece's public-key cryptosystem," in Proc. Adv. Crypt. - EUROCRYPT, Davos, Switzerland, May 25-27, 1988, pp. 275-280.
-
(1988)
Proc. Adv. Crypt. - EUROCRYPT
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
16
-
-
0002448405
-
"A public-key cryptosystem based on algebraic coding theory"
-
R. J. McEliece, "A public-key cryptosystem based on algebraic coding theory," JPL DSN Progr. Rep., pp. 114-116, 1978.
-
(1978)
JPL DSN Progr. Rep.
, pp. 114-116
-
-
McEliece, R.J.1
-
17
-
-
0343079682
-
"On the McEliece public-key cryptosystem"
-
Santa Barbara, CA, Aug. 21-25
-
J. van Tilburg, "On the McEliece public-key cryptosystem," in Proc. Adv. Crypt. - CRYPTO, Santa Barbara, CA, Aug. 21-25, 1988, pp. 119-131.
-
(1988)
Proc. Adv. Crypt. - CRYPTO
, pp. 119-131
-
-
van Tilburg, J.1
|