-
1
-
-
35248890430
-
Computational analogues of entropy
-
Lecture Notes in Comput. Sci. Springer-Verlag Berlin
-
B. Barak, R. Shaltiel, and A. Wigderson Computational analogues of entropy APPROX 2003 + RANDOM 2003 Lecture Notes in Comput. Sci. vol. 2764 2003 Springer-Verlag Berlin 200 215
-
(2003)
APPROX 2003 + RANDOM 2003
, vol.2764
, pp. 200-215
-
-
Barak, B.1
Shaltiel, R.2
Wigderson, A.3
-
2
-
-
23444435831
-
Forgery: 'Fingerprinting' documents and packaging
-
DOI 10.1038/436475a
-
J.D.R. Buchanan, R.P. Cowburn, A. Jausovec, D. Petit, P. Seem, G. Xiong, D. Atkinson, K. Fenton, D.A. Allwood, and M.T. Bryan Forgery: 'fingerprinting' documents and packaging Nat. Brief Commun. 436 July 2005 475 (Pubitemid 41112906)
-
(2005)
Nature
, vol.436
, Issue.7050
, pp. 475
-
-
Buchanan, J.D.R.1
Cowburn, R.P.2
Jausovec, A.-V.3
Petit, D.4
Seem, P.5
Xiong, G.6
Atkinson, D.7
Fenton, K.8
Allwood, D.A.9
Bryan, M.T.10
-
3
-
-
0018456171
-
Universal classes of hash functions
-
L. Carter, and M.N. Wegman Universal classes of hash functions J. Comput. System Sci. 18 2 1979 143 154
-
(1979)
J. Comput. System Sci.
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
4
-
-
79960843047
-
Secure hardware processors using silicon physical one-way functions
-
R. Sandu (Ed.)
-
D. Clarke, B. Gassend, M. van Dijk, S. Devadas, Secure hardware processors using silicon physical one-way functions, in: R. Sandu (Ed.), ACM CCS '02, 2002.
-
(2002)
ACM CCS '02
-
-
Clarke, D.1
Gassend, B.2
Van Dijk, M.3
Devadas, S.4
-
6
-
-
36348947793
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Report 2003/235
-
Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Cryptology ePrint Archive, Report 2003/235, 2003.
-
(2003)
Cryptology EPrint Archive
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
7
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data SIAM J. Comput. 38 1 2008 97 139
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
38049015807
-
FPGA intrinsic PUFs and their use for IP protection
-
P. Paillier, I. Verbauwhede, Lecture Notes in Comput. Sci. Springer
-
J. Guajardo, S.S. Kumar, G.J. Schrijen, and P. Tuyls FPGA intrinsic PUFs and their use for IP protection P. Paillier, I. Verbauwhede, CHES Lecture Notes in Comput. Sci. vol. 4727 2007 Springer 63 80
-
(2007)
CHES
, vol.4727
, pp. 63-80
-
-
Guajardo, J.1
Kumar, S.S.2
Schrijen, G.J.3
Tuyls, P.4
-
9
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L.A. Levin, and M. Luby A pseudorandom generator from any one-way function SIAM J. Comput. 28 4 1999 1364 1396
-
(1999)
SIAM J. Comput.
, vol.28
, Issue.4
, pp. 1364-1396
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
12
-
-
8844225798
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J. Kittler, M. Nixon, Lecture Notes in Comput. Sci. Springer-Verlag
-
J.-P.M.G. Linnartz, and P. Tuyls New shielding functions to enhance privacy and prevent misuse of biometric templates J. Kittler, M. Nixon, Conference on Audio and Video Based Person Authentication Lecture Notes in Comput. Sci. vol. 2688 2003 Springer-Verlag 238 250
-
(2003)
Conference on Audio and Video Based Person Authentication
, vol.2688
, pp. 238-250
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
14
-
-
33846181385
-
-
PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September
-
R. Renner, Security of quantum key distribution, PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, September 2005, available at http://arxiv.org/abs/quant-ph/0512258.
-
(2005)
Security of Quantum Key Distribution
-
-
Renner, R.1
-
18
-
-
71049183202
-
Universal hashing and authentication codes
-
J. Feigenbaum, Lecture Notes in Comput. Sci. Springer
-
D.R. Stinson Universal hashing and authentication codes J. Feigenbaum, CRYPTO Lecture Notes in Comput. Sci. vol. 576 1991 Springer 74 85
-
(1991)
CRYPTO
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
19
-
-
0000410707
-
Universal hashing and authentication codes
-
D.R. Stinson Universal hashing and authentication codes Des. Codes Cryptogr. 4 4 1994 369 380
-
(1994)
Des. Codes Cryptogr.
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.R.1
-
20
-
-
24144493986
-
Universal hash families and the leftover hash lemma, and applications to cryptography and computing
-
D.R. Stinson Universal hash families and the leftover hash lemma, and applications to cryptography and computing J. Combin. Math. Combin. Comput. 42 2002 3 31
-
(2002)
J. Combin. Math. Combin. Comput.
, vol.42
, pp. 3-31
-
-
Stinson, D.R.1
-
21
-
-
33750726983
-
Read-proof hardware from protective coatings
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
P. Tuyls, G.J. Schrijen, B. Škorić, J. van Geloven, R. Verhaegh, and R. Wolters Read-proof hardware from protective coatings L. Goubin, M. Matsui, Cryptographic Hardware and Embedded Systems - CHES 2006 Lecture Notes in Comput. Sci. vol. 4249 2006 Springer-Verlag 369 383 (Pubitemid 44700070)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249
, pp. 369-383
-
-
Tuyls, P.1
Schrijen, G.-J.2
Skoric, B.3
Van Geloven, J.4
Verhaegh, N.5
Wolters, R.6
-
23
-
-
79960848452
-
Randomized resonators as uniquely identifiable anti-counterfeiting tags, March 2008
-
B. Škorić, T. Bel, A.H.M. Blom, B.R. de Jong, H. Kretschman, A.J.M. Nellissen, Randomized resonators as uniquely identifiable anti-counterfeiting tags, March 2008, Secure Component and System Identification (SECSI) Workshop.
-
Secure Component and System Identification (SECSI) Workshop
-
-
Škorić, B.1
|