-
1
-
-
0034317309
-
Upper bounds for constant-weight codes
-
E. AGRELL, A. VARDY, AND K. ZEGER, Upper bounds for constant-weight codes, IEEE Trans. Inform. Theory, 46 (2000), pp. 2373-2395.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 2373-2395
-
-
AGRELL, E.1
VARDY, A.2
ZEGER, K.3
-
2
-
-
46749125378
-
The computational hardness of estimating edit distance
-
Providence, RI
-
A. ANDONI AND R. KRAUTHGAMER, The computational hardness of estimating edit distance, in IEEE Symposium on Foundations of Computer Science (FOCS), Providence, RI, 2007, pp. 724-734.
-
(2007)
IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 724-734
-
-
ANDONI, A.1
KRAUTHGAMER, R.2
-
3
-
-
33845411375
-
-
Tech. report 2004/021, Cryptology e-print archive
-
C. BARRAL, J.-S. CORON, AND D. NACCACHE, Externalized Fingerprint Matching, Tech. report 2004/021, Cryptology e-print archive, http://eprint.iacr.org, 2004.
-
(2004)
Externalized Fingerprint Matching
-
-
BARRAL, C.1
CORON, J.-S.2
NACCACHE, D.3
-
4
-
-
0023985539
-
Privacy amplification by public discussion
-
C. H. BENNETT, G. BRASSARD, AND J.-M. ROBERT, Privacy amplification by public discussion, SIAM J. Comput., 17 (1988), pp. 210-229.
-
(1988)
SIAM J. Comput
, vol.17
, pp. 210-229
-
-
BENNETT, C.H.1
BRASSARD, G.2
ROBERT, J.-M.3
-
5
-
-
0029405656
-
Generalized privacy amplification
-
C. H. BENNETT, G. BRASSARD, C. CRÉPEAU, AND U. M. MAURER, Generalized privacy amplification, IEEE Trans. Inform. Theory, 41 (1995), pp. 1915-1923.
-
(1995)
IEEE Trans. Inform. Theory
, vol.41
, pp. 1915-1923
-
-
BENNETT, C.H.1
BRASSARD, G.2
CRÉPEAU, C.3
MAURER, U.M.4
-
6
-
-
84969361843
-
Practical quantum oblivious transfer, in Advances in Cryptology-CRYPTO '91, 1991
-
J. Feigenbaum, ed, Springer-Verlag, New York
-
C. H. BENNETT, G. BRASSARD, C. CRÉPEAU, AND M.-H. SKUBISZEWSKA, Practical quantum oblivious transfer, in Advances in Cryptology-CRYPTO '91, 1991, Lecture Notes in Comput. Sci. 576, J. Feigenbaum, ed., Springer-Verlag, New York, 1992, pp. 351-366.
-
(1992)
Lecture Notes in Comput. Sci
, vol.576
, pp. 351-366
-
-
BENNETT, C.H.1
BRASSARD, G.2
CRÉPEAU, C.3
SKUBISZEWSKA, M.-H.4
-
7
-
-
33747185115
-
-
R. E. BLAHUT, Theory and Practice of Error Control Codes, Addison Wesley Longman, Reading, MA, 19S3.
-
Theory and Practice of Error Control Codes, Addison Wesley Longman, Reading, MA, 19S3
-
-
BLAHUT, R.E.1
-
9
-
-
24944501364
-
-
X. BOYEN, Y. DODIS, J. KATZ, R. OSTROVSKY, AND A. SMITH, Secure remote authentication using biometric data, in Advances in Cryptology-EUROCRYPT 2005, Lecture Notes in Comput. Sci. 3494, R. Cramer, ed., Springer-Verlag, New York, 2005, pp. 147-163.
-
X. BOYEN, Y. DODIS, J. KATZ, R. OSTROVSKY, AND A. SMITH, Secure remote authentication using biometric data, in Advances in Cryptology-EUROCRYPT 2005, Lecture Notes in Comput. Sci. 3494, R. Cramer, ed., Springer-Verlag, New York, 2005, pp. 147-163.
-
-
-
-
10
-
-
0031346696
-
On the resemblence and containment of documents
-
IEEE Computer Society, Washington, DC
-
A. BRODER, On the resemblence and containment of documents, in Proceedings of Compression and Complexity of Sequences, IEEE Computer Society, Washington, DC, 1997, pp. 21-29.
-
(1997)
Proceedings of Compression and Complexity of Sequences
, pp. 21-29
-
-
BRODER, A.1
-
11
-
-
0025519305
-
A new table of constant weight codes
-
A. E. BROUWER, J. B. SHEARER, N. J. A. SLOANE, AND W. D. SMITH, A new table of constant weight codes, IEEE Trans. Inform. Theory, 36 (1990), pp. 1334-1380.
-
(1990)
IEEE Trans. Inform. Theory
, vol.36
, pp. 1334-1380
-
-
BROUWER, A.E.1
SHEARER, J.B.2
SLOANE, N.J.A.3
SMITH, W.D.4
-
12
-
-
0018456171
-
Universal classes of hash functions
-
J. L. CARTER AND M. N. WEGMAN, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
-
(1979)
J. Comput. System Sci
, vol.18
, pp. 143-154
-
-
CARTER, J.L.1
WEGMAN, M.N.2
-
13
-
-
37849022771
-
-
Tech. report 2006/090, Cryptology e-print archive
-
E.-C. CHANG, V. FEDYUKOVYCH, AND Q. LI, Secure Sketch for Multi-Sets, Tech. report 2006/090, Cryptology e-print archive, http://eprint.iacr.org, 2006.
-
(2006)
Secure Sketch for Multi-Sets
-
-
CHANG, E.-C.1
FEDYUKOVYCH, V.2
LI, Q.3
-
14
-
-
33746049783
-
-
E.-C. CHANG AND Q. LI, Hiding secret points amidst chaff, in Advances in Cryptology-EUROCRYPT 2006, Lecture Notes in Comput. Sci. 4004, S. Vaudenay, ed., Springer Verlag, New York, 2006, pp. 59-72.
-
E.-C. CHANG AND Q. LI, Hiding secret points amidst chaff, in Advances in Cryptology-EUROCRYPT 2006, Lecture Notes in Comput. Sci. 4004, S. Vaudenay, ed., Springer Verlag, New York, 2006, pp. 59-72.
-
-
-
-
16
-
-
0023985259
-
Unbiased bits from sources of weak randomness and probabilistic communication complexity
-
B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230-261.
-
(1988)
SIAM J. Comput
, vol.17
, pp. 230-261
-
-
CHOR, B.1
GOLDREICH, O.2
-
17
-
-
5044245853
-
Generalized coset schemes for the wire-tap channel: Application to biometrics
-
Chicago, IL
-
G. COHEN AND G. ZÉMOR, Generalized coset schemes for the wire-tap channel: Application to biometrics, in Proceedings of the IEEE International Symposium on Information Theory, Chicago, IL, 2004, p. 46.
-
(2004)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 46
-
-
COHEN, G.1
ZÉMOR, G.2
-
18
-
-
84957356475
-
-
C. CRÉPEAU, Efficient cryptographic protocols based on noisy channels, in Advances in Cryptology-EUROCRYPT 97, 1997, Lecture Notes in Comput. Sci. 1233, W. Fumy, ed., Springer-Verlag, New York, pp. 306-317.
-
C. CRÉPEAU, Efficient cryptographic protocols based on noisy channels, in Advances in Cryptology-EUROCRYPT 97, 1997, Lecture Notes in Comput. Sci. 1233, W. Fumy, ed., Springer-Verlag, New York, pp. 306-317.
-
-
-
-
19
-
-
33745269996
-
Geometrical cryptography
-
Versailles, France
-
L. CSIRMAZ AND G. O. H. KATONA, Geometrical cryptography, in Proceedings of the International Workshop on Coding and Cryptography, Versailles, France, 2003, pp. 578-599.
-
(2003)
Proceedings of the International Workshop on Coding and Cryptography
, pp. 578-599
-
-
CSIRMAZ, L.1
KATONA, G.O.H.2
-
20
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identification scheme
-
Paris, France, also available online from and, http://www.cs.yale.edu/homes/peralta/papers/iris.ps
-
G. I. DAVIDA, Y. FRANKEL, B. J. MATT, AND R. PERALTA, On the relation of error correction and cryptography to an off line biometric based identification scheme, in Proceedings of the International Workshop on Coding and Cryptography, Paris, France, 1999; also available online from http://citeseer.ist.psu.edu/389295.html and http://www.cs.yale.edu/homes/peralta/papers/iris.ps.
-
(1999)
Proceedings of the International Workshop on Coding and Cryptography
-
-
DAVIDA, G.I.1
FRANKEL, Y.2
MATT, B.J.3
PERALTA, R.4
-
21
-
-
24144491268
-
Error correction in the bounded storage model, in Theory of Cryptology
-
Springer-Verlag, Berlin
-
Y. Z. DING, Error correction in the bounded storage model, in Theory of Cryptology, Lecture Notes in Comput. Sci. 3378, Springer-Verlag, Berlin, 2005, pp. 578-599.
-
(2005)
Lecture Notes in Comput. Sci
, vol.3378
, pp. 578-599
-
-
DING, Y.Z.1
-
23
-
-
33749541274
-
-
Y. DODIS, J. KATZ, L. REYZIN, AND A. SMITH, Robust fuzzy extractors and authenticated key agreement from close secrets, in Advances in Cryptology-CRYPTO 2006, Lecture Notes in Comput. Sci. 4117, C. Dwork, ed., Springer-Verlag, Berlin, 2006, pp. 232-250.
-
Y. DODIS, J. KATZ, L. REYZIN, AND A. SMITH, Robust fuzzy extractors and authenticated key agreement from close secrets, in Advances in Cryptology-CRYPTO 2006, Lecture Notes in Comput. Sci. 4117, C. Dwork, ed., Springer-Verlag, Berlin, 2006, pp. 232-250.
-
-
-
-
24
-
-
36348947793
-
-
Tech. report 2003/235, Cryptology ePrint archive
-
Y. DODIS, R. OSTROVSKY, L. REYZIN, AND A. SMITH, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Tech. report 2003/235, Cryptology ePrint archive, http://eprint.iacr.org, 2006.
-
(2006)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
-
DODIS, Y.1
OSTROVSKY, R.2
REYZIN, L.3
SMITH, A.4
-
25
-
-
35048865463
-
-
Y. DODIS, L. REYZIN, AND A. SMITH, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Advances in Cryptology-EUROCRYPT 2004, Lecture Notes in Comput. Sci. 3027, C. Cachin and J. Camenisch, eds., Springer-Verlag, Berlin, 2004, pp. 523-540.
-
Y. DODIS, L. REYZIN, AND A. SMITH, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Advances in Cryptology-EUROCRYPT 2004, Lecture Notes in Comput. Sci. 3027, C. Cachin and J. Camenisch, eds., Springer-Verlag, Berlin, 2004, pp. 523-540.
-
-
-
-
26
-
-
84873433835
-
Fuzzy extractors
-
Springer-Verlag, Berlin
-
Y. DODIS, L. REYZIN, AND A. SMITH, Fuzzy extractors, in Security with Noisy Data, Springer-Verlag, Berlin, 2007, pp. 79-100.
-
(2007)
Security with Noisy Data
, pp. 79-100
-
-
DODIS, Y.1
REYZIN, L.2
SMITH, A.3
-
27
-
-
34848837353
-
Correcting errors without leaking partial information
-
H. N. Gabow and R. Fagin, eds, ACM, New York
-
Y. DODIS AND A. SMITH, Correcting errors without leaking partial information, in Proceedings of the ACM Symposium on Theory of Computing, H. N. Gabow and R. Fagin, eds., ACM, New York, 2005, pp. 654-663.
-
(2005)
Proceedings of the ACM Symposium on Theory of Computing
, pp. 654-663
-
-
DODIS, Y.1
SMITH, A.2
-
28
-
-
0034140877
-
Protecting keys with personal entropy
-
C. ELLISON, C. HALL, R. MILBERT, AND B. SCHNEIER, Protecting keys with personal entropy, Future Generation Computer Systems, 16 (2000), pp. 311-318.
-
(2000)
Future Generation Computer Systems
, vol.16
, pp. 311-318
-
-
ELLISON, C.1
HALL, C.2
MILBERT, R.3
SCHNEIER, B.4
-
29
-
-
0004137776
-
-
Ph.D. thesis, MIT, Cambridge, MA
-
G. D. FORNEY, Concatenated Codes, Ph.D. thesis, MIT, Cambridge, MA, 1966.
-
(1966)
Concatenated Codes
-
-
FORNEY, G.D.1
-
30
-
-
0010224695
-
-
Master's thesis, Umeå University, Umeå, Sweden
-
N. FRYKHOLM, Passwords: Beyond the Terminal Interaction Model, Master's thesis, Umeå University, Umeå, Sweden, 2000.
-
(2000)
Passwords: Beyond the Terminal Interaction Model
-
-
FRYKHOLM, N.1
-
31
-
-
0035747783
-
Error-tolerant password recovery
-
ACM, New York
-
N. FRYKHOLM AND A. JUELS, Error-tolerant password recovery, in Proceedings of the 8th ACM Conference on Computer and Communication Security, ACM, New York, 2001, pp. 1-8.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communication Security
, pp. 1-8
-
-
FRYKHOLM, N.1
JUELS, A.2
-
32
-
-
0003460538
-
-
Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA
-
V. GURUSWAMI, List Decoding of Error-Correcting Codes, Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, 2001.
-
(2001)
List Decoding of Error-Correcting Codes
-
-
GURUSWAMI, V.1
-
33
-
-
0043016183
-
List decoding with side information
-
IEEE Computer Society, Washington, DC
-
V. GURUSWAMI, List decoding with side information, in Proceedings of the IEEE Conference on Computational Complexity, IEEE Computer Society, Washington, DC, 2003, p. 300.
-
(2003)
Proceedings of the IEEE Conference on Computational Complexity
, pp. 300
-
-
GURUSWAMI, V.1
-
34
-
-
33748105468
-
Explicit capacity-achieving list-decodable codes
-
J. M. Kleinberg, ed, ACM, New York
-
V. GURUSWAMI AND A. RUDRA, Explicit capacity-achieving list-decodable codes, in Proceedings of the ACM Symposium on Theory of Computing, J. M. Kleinberg, ed., ACM, New York, 2006, pp. 1-10.
-
(2006)
Proceedings of the ACM Symposium on Theory of Computing
, pp. 1-10
-
-
GURUSWAMI, V.1
RUDRA, A.2
-
35
-
-
0033690275
-
List decoding algorithms for certain concatenated codes
-
Portland, OR
-
V. GURUSWAMI AND M. SUDAN, List decoding algorithms for certain concatenated codes, in Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, Portland, OR, 2000, pp. 181-190.
-
(2000)
Proceedings of the 32nd Annual ACM Symposium on Theory of Computing
, pp. 181-190
-
-
GURUSWAMI, V.1
SUDAN, M.2
-
36
-
-
55249119744
-
-
K. HARMON, S. JOHNSON, AND L. REYZIN, An Implementation of Syndrome Encoding and Decoding for Binary BCH Codes, Secure Sketches and Fuzzy Extractors, available at http://www.cs.bu.edu/ ̃reyzin/code/fuzzy.html (2006).
-
K. HARMON, S. JOHNSON, AND L. REYZIN, An Implementation of Syndrome Encoding and Decoding for Binary BCH Codes, Secure Sketches and Fuzzy Extractors, available at http://www.cs.bu.edu/ ̃reyzin/code/fuzzy.html (2006).
-
-
-
-
37
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. HÅSTAD, R. IMPAGLIAZZO, L. A. LEVIN, AND M. LUBY, A pseudorandom generator from any one-way function, SIAM J. Comput., 28 (1999), pp. 1364-1396.
-
(1999)
SIAM J. Comput
, vol.28
, pp. 1364-1396
-
-
HÅSTAD, J.1
IMPAGLIAZZO, R.2
LEVIN, L.A.3
LUBY, M.4
-
38
-
-
30844458593
-
A fuzzy vault scheme
-
A. JUELS AND M. SUDAN, A fuzzy vault scheme, Des. Codes Cryptogr., 38 (2006), pp. 237-257.
-
(2006)
Des. Codes Cryptogr
, vol.38
, pp. 237-257
-
-
JUELS, A.1
SUDAN, M.2
-
39
-
-
0033281339
-
A fuzzy commitment scheme
-
ACM, New York
-
A. JUELS AND M. WATTENBERG, A fuzzy commitment scheme, in Proceedings of the 6th ACM Conference on Computer and Communication Security, ACM, New York, 1999, pp. 28-36.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communication Security
, pp. 28-36
-
-
JUELS, A.1
WATTENBERG, M.2
-
40
-
-
0039547692
-
Subquadratic-time factoring of polynomials over finite fields
-
Las Vegas, NV
-
E. KALTOFEN AND V. SHOUP, Subquadratic-time factoring of polynomials over finite fields, in Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, NV, 1995, pp. 398-406.
-
(1995)
Proceedings of the 27th Annual ACM Symposium on the Theory of Computing
, pp. 398-406
-
-
KALTOFEN, E.1
SHOUP, V.2
-
41
-
-
0001464763
-
Multiplication of multidigit numbers on automata
-
A. A. KARATSUBA AND Y. OFMAN, Multiplication of multidigit numbers on automata, Soviet Physics Doklady, 7 (1963), pp. 595-596.
-
(1963)
Soviet Physics Doklady
, vol.7
, pp. 595-596
-
-
KARATSUBA, A.A.1
OFMAN, Y.2
-
42
-
-
84947906944
-
Secure applications of low-entropy keys, in ISW
-
E. Okamoto, G. I. Davida, and M. Mambo, eds, Springer-Verlag, Berlin
-
J. KELSEY, B. SCHNEIER, C. HALL, AND D. WAGNER, Secure applications of low-entropy keys, in ISW, Lecture Notes in Comput. Sci. 1396, E. Okamoto, G. I. Davida, and M. Mambo, eds., Springer-Verlag, Berlin, 1997, pp. 121-134.
-
(1997)
Lecture Notes in Comput. Sci
, vol.1396
, pp. 121-134
-
-
KELSEY, J.1
SCHNEIER, B.2
HALL, C.3
WAGNER, D.4
-
43
-
-
17744399088
-
Private codes or succinct random codes that are (almost) perfect
-
IEEE Computer Society, Washington, DC
-
M. LANGBERG, Private codes or succinct random codes that are (almost) perfect, in Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS'04), IEEE Computer Society, Washington, DC, 2004, pp. 325-334.
-
(2004)
Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS'04)
, pp. 325-334
-
-
LANGBERG, M.1
-
44
-
-
77649250983
-
Secure sketch for biometric templates
-
Advances in Cryptology-ASIACRYPT 2006, Springer-Verlag, Berlin
-
Q. LI, Y. SUTCU, AND N. MEMON, Secure sketch for biometric templates, in Advances in Cryptology-ASIACRYPT 2006, Lecture Notes in Comput. Sci. 4284, Springer-Verlag, Berlin, 2006, pp. 99-113.
-
(2006)
Lecture Notes in Comput. Sci
, vol.4284
, pp. 99-113
-
-
LI, Q.1
SUTCU, Y.2
MEMON, N.3
-
45
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
AVBPA, Springer-Verlag, Berlin
-
J.-P. M. G. LINNARTZ, AND P. TUYLS, New shielding functions to enhance privacy and prevent misuse of biometric templates, in AVBPA 2003, Lecture Notes in Comput. Sci. 2688, Springer-Verlag, Berlin, 2003, pp. 393-402.
-
(2003)
Lecture Notes in Comput. Sci
, vol.2688
, pp. 393-402
-
-
LINNARTZ, J.-P.M.G.1
TUYLS, P.2
-
46
-
-
85027524331
-
-
R. J. LIPTON, A new approach to information theory, in STAGS, Lecture Notes in Comput. Sci. 775, P. Enjalbert, E. W. Mayr, and K. W. Wagner, eds., Springer-Verlag, Berlin, 1994, pp. 699-708.
-
R. J. LIPTON, A new approach to information theory, in STAGS, Lecture Notes in Comput. Sci. 775, P. Enjalbert, E. W. Mayr, and K. W. Wagner, eds., Springer-Verlag, Berlin, 1994, pp. 699-708.
-
-
-
-
47
-
-
0027599802
-
Secret key agreement by public discussion from common information
-
U. MAURER, Secret key agreement by public discussion from common information, IEEE Trans. Inform. Theory, 39 (1993), pp. 733-742.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 733-742
-
-
MAURER, U.1
-
48
-
-
24144474940
-
Optimal error correction against computationally bounded noise, in Theory of Cryptology
-
Springer-Verlag, Berlin
-
S. MICALI, C. PEIKERT, M. SUDAN, AND D. WILSON, Optimal error correction against computationally bounded noise, in Theory of Cryptology, Lecture Notes in Comput. Sci. 3378, Springer-Verlag, Berlin, 2005, pp. 1-16.
-
(2005)
Lecture Notes in Comput. Sci
, vol.3378
, pp. 1-16
-
-
MICALI, S.1
PEIKERT, C.2
SUDAN, M.3
WILSON, D.4
-
50
-
-
7244251173
-
Scalable set reconciliation
-
Monticello, IL
-
Y. MINSKY AND A. TRACHTENBERG, Scalable set reconciliation, in 40th Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, 2002, pp. 1607-1616.
-
(2002)
40th Annual Allerton Conference on Communication, Control and Computing
, pp. 1607-1616
-
-
MINSKY, Y.1
TRACHTENBERG, A.2
-
51
-
-
0041779657
-
Set reconciliation with nearly optimal communication complexity
-
Y. MINSKY, A. TRACHTENBERG, AND R. ZIPPEL, Set reconciliation with nearly optimal communication complexity, IEEE Trans. Inform. Theory, 49 (2003), pp. 2213-2218.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, pp. 2213-2218
-
-
MINSKY, Y.1
TRACHTENBERG, A.2
ZIPPEL, R.3
-
52
-
-
0034829626
-
Cryptographic key generation from voice
-
M. Abadi and R. Needham, eds, IEEE Computer Society, Washington, DC
-
F. MONROSE, M. K. REITER, Q. LI, AND S. WETZEL, Cryptographic key generation from voice, in Proceedings of the IEEE Symposium on Security and Privacy. M. Abadi and R. Needham, eds., IEEE Computer Society, Washington, DC, 2001, pp. 202-213.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
MONROSE, F.1
REITER, M.K.2
LI, Q.3
WETZEL, S.4
-
53
-
-
84894038661
-
Using voice to generate cryptographic keys
-
Crete, Greece
-
F. MONROSE, M. K. REITER, Q. LI, AND S. WETZEL, Using voice to generate cryptographic keys, in A Speaker Odyssey: The Speaker Recognition Workshop, Crete, Greece, 2001, pp. 237-242.
-
(2001)
A Speaker Odyssey: The Speaker Recognition Workshop
, pp. 237-242
-
-
MONROSE, F.1
REITER, M.K.2
LI, Q.3
WETZEL, S.4
-
54
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
ACM, New York
-
F. MONROSE, M. K. REITER, AND S. WETZEL, Password hardening based on keystroke dynamics, in Proceedings of the 6th ACM Conference on Computer and Communication Security, ACM, New York, 1999, pp. 73-82.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communication Security
, pp. 73-82
-
-
MONROSE, F.1
REITER, M.K.2
WETZEL, S.3
-
57
-
-
33244472491
-
LOW distortion embeddings for edit distance
-
Baltimore, MD
-
R. OSTROVSKY AND Y. RABANI, LOW distortion embeddings for edit distance, in Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, 2005, pp. 218-224.
-
(2005)
Proceedings of the 37th Annual ACM Symposium on Theory of Computing
, pp. 218-224
-
-
OSTROVSKY, R.1
RABANI, Y.2
-
58
-
-
33646831750
-
Correcting errors beyond the Guruswami-Sudan radius in polynomial time
-
IEEE Computer Society, Washington, DC
-
F. PARVARESH AND A. VARDY, Correcting errors beyond the Guruswami-Sudan radius in polynomial time, in Proceedings of the IEEE International Symposium on Foundations of Computer Science, IEEE Computer Society, Washington, DC, 2005, pp. 285-294.
-
(2005)
Proceedings of the IEEE International Symposium on Foundations of Computer Science
, pp. 285-294
-
-
PARVARESH, F.1
VARDY, A.2
-
59
-
-
0002956996
-
Bounds for dispersers, extractors, and depth-two super-concentrators
-
J. RADHAKRISHNAN AND A. TA-SHMA, Bounds for dispersers, extractors, and depth-two super-concentrators, SIAM J. Discrete Math., 13 (2000), pp. 2-24.
-
(2000)
SIAM J. Discrete Math
, vol.13
, pp. 2-24
-
-
RADHAKRISHNAN, J.1
TA-SHMA, A.2
-
60
-
-
5044251619
-
Smooth Rényi entropy and applications
-
Chicago, IL
-
R. RENNER AND S. WOLF, Smooth Rényi entropy and applications, in Proceedings of the IEEE International Symposium on Information Theory, Chicago, IL, 2004, p. 233.
-
(2004)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 233
-
-
RENNER, R.1
WOLF, S.2
-
61
-
-
33646767482
-
-
R. RENNER AND S. WOLF, Simple and tight bounds for information reconciliation and privacy amplification, in Advances in Cryptology - ACRYPT 2005, Lecture Notes in Comput. Sci. 3788, B. Roy, ed., Springer-Verlag, Berlin, 2005, pp. 199-216.
-
R. RENNER AND S. WOLF, Simple and tight bounds for information reconciliation and privacy amplification, in Advances in Cryptology - ACRYPT 2005, Lecture Notes in Comput. Sci. 3788, B. Roy, ed., Springer-Verlag, Berlin, 2005, pp. 199-216.
-
-
-
-
62
-
-
55249083027
-
Entropy Loss is Maximal for Uniform Inputs
-
Tech. report BUCS-TR-2007-011, CS Department, Boston University, Boston, MA, available online horn
-
L. REYZIN, Entropy Loss is Maximal for Uniform Inputs, Tech. report BUCS-TR-2007-011, CS Department, Boston University, Boston, MA, 2007; available online horn http://www.cs.bu.edu/techreports/.
-
(2007)
-
-
REYZIN, L.1
-
63
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. SHALTIEL, Recent developments in explicit constructions of extractors, Bull. EATCS, 77 (2002), pp 67-95.
-
(2002)
Bull. EATCS
, vol.77
, pp. 67-95
-
-
SHALTIEL, R.1
-
67
-
-
84892206408
-
Scrambling adversarial errors using few random bits
-
H. Gabow, ed, ACM, New York, SIAM, Philadelphia
-
A. SMITH, Scrambling adversarial errors using few random bits, in ACM-SIAM Symposium on Discrete Algorithms (SODA), H. Gabow, ed., ACM, New York, SIAM, Philadelphia, 2007.
-
(2007)
ACM-SIAM Symposium on Discrete Algorithms (SODA)
-
-
SMITH, A.1
-
68
-
-
0041953943
-
Efficient PDA synchronization
-
D. STAROBINSKI, A. TRACHTENBERG, AND S. AGARWAL, Efficient PDA synchronization, IEEE Trans. Mobile Computing, 2 (2003), pp. 40-51.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, pp. 40-51
-
-
STAROBINSKI, D.1
TRACHTENBERG, A.2
AGARWAL, S.3
-
70
-
-
0016434152
-
A method for solving key equation for decoding Goppa codes
-
Y. SUGIYAMA, M. KASAHARA, S. HIRASAWA, AND T. NAMEKAWA, A method for solving key equation for decoding Goppa codes, Inform. and Control, 27 (1975), pp. 87-99.
-
(1975)
Inform. and Control
, vol.27
, pp. 87-99
-
-
SUGIYAMA, Y.1
KASAHARA, M.2
HIRASAWA, S.3
NAMEKAWA, T.4
-
71
-
-
33845435077
-
-
P. TUYLS AND J. GOSELING, Capacity and examples of template-protecting biometric authentication systems, in ECCV Workshop BioAW, Lecture Notes in Comput. Sci. 3087, D. Maltoni and A. K. Jain, eds., Springer-Verlag, Berlin, 2004, pp. 158-170.
-
P. TUYLS AND J. GOSELING, Capacity and examples of template-protecting biometric authentication systems, in ECCV Workshop BioAW, Lecture Notes in Comput. Sci. 3087, D. Maltoni and A. K. Jain, eds., Springer-Verlag, Berlin, 2004, pp. 158-170.
-
-
-
-
73
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
E. VERBITSKIY, P. TUYLS, D. DENTENEER, AND J.-P. LINNARTZ, Reliable biometric authentication with privacy protection, in Proceedings of the 24th Benelux Symposium on Information Theory, Society for Information Theory, The Benelux, 2003.
-
(2003)
Proceedings of the 24th Benelux Symposium on Information Theory, Society for Information Theory, The Benelux
-
-
VERBITSKIY, E.1
TUYLS, P.2
DENTENEER, D.3
LINNARTZ, J.-P.4
-
74
-
-
55249103617
-
-
J. VON ZUR GATHEN AND J. GERHARD, Modern Computer Algebra, Cambridge University Press, Cambridge, UK, 2003.
-
J. VON ZUR GATHEN AND J. GERHARD, Modern Computer Algebra, Cambridge University Press, Cambridge, UK, 2003.
-
-
-
-
75
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. WEGMAN AND J. L. CARTER, New hash functions and their use in authentication and set equality, J. Comput. System Sci., 22 (1981), pp. 265-279.
-
(1981)
J. Comput. System Sci
, vol.22
, pp. 265-279
-
-
WEGMAN, M.N.1
CARTER, J.L.2
|