-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0000552770
-
-
Notices of the American Mathematical Society AMS
-
Boneh, D.: Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society (AMS) 46(2), 203-213 (1999)
-
(1999)
Twenty years of attacks on the RSA cryptosystem
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
3
-
-
84874800178
-
-
ElGamal, T., Public, A.: Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469-472 (1985)
-
ElGamal, T., Public, A.: Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory IT-30(4), 469-472 (1985)
-
-
-
-
4
-
-
38049132153
-
-
also available at
-
Juels, A., Sudan, M.: A Fuzzy Vault Scheme, also available at http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/publications/fuzzy-vault/ fuzzy.vault.pdf
-
A Fuzzy Vault Scheme
-
-
Juels, A.1
Sudan, M.2
-
5
-
-
0004192381
-
-
CRC Press, Boca Raton, USA
-
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, pp.287-291, pp.312-315. CRC Press, Boca Raton, USA (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
6
-
-
33845435077
-
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, 3087, pp. 158-170. Springer, Heidelberg (2004)
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158-170. Springer, Heidelberg (2004)
-
-
-
-
8
-
-
38149112600
-
Fuzzy Extractors: How to generate strong keys from biometric identification
-
IEEE Computer Society Press, Los Alamitos
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometric identification. In: Proceedings of the Security and Privacy, IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proceedings of the Security and Privacy
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
24944501364
-
Secure remote authentication using biometrics
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometrics. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147-163. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
13
-
-
35048889066
-
Practical digital signature generation using biometrics
-
Laganà, A, Gavrilova, M, Kumar, V, Mun, Y, Tan, C.J.K, Gervasi, O, eds, ICCSA 2004, Springer, Heidelberg
-
Kwon, T., Lee, J.: Practical digital signature generation using biometrics. In: Laganà, A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3043
-
-
Kwon, T.1
Lee, J.2
-
14
-
-
38049155897
-
Towards biometric digital signatures
-
Eszterhazy College, Eger March
-
Orvos, P.: Towards biometric digital signatures. Networkshop, pp. 26-28. Eszterhazy College, Eger (March 2002)
-
(2002)
Networkshop
, pp. 26-28
-
-
Orvos, P.1
-
15
-
-
33845435077
-
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, 3087, pp. 158-170. Springer, Heidelberg (2004)
-
Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol. 3087, pp. 158-170. Springer, Heidelberg (2004)
-
-
-
|