-
1
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," (a preliminary version of this paper appeared in eurocrypt 2004)
-
Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," (A preliminary version of this paper appeared in Eurocrypt 2004) SIAM J. Comput., 38(1), pp. 97-139, 2008.
-
(2008)
SIAM J. Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
2
-
-
77957133407
-
How to strongly link data and its medium: The paper case
-
P. Bulens, F.-X. Standaert and J.-J. Quisquater, "How to strongly link data and its medium: the paper case," IET Inf. Secur., Vol. 4, Iss. 3, pp. 125-136, 2010.
-
(2010)
IET Inf. Secur
, vol.4
, Issue.3
, pp. 125-136
-
-
Bulens, P.1
Standaert, F.-X.2
Quisquater, J.-J.3
-
3
-
-
84862102864
-
A method for cryptographic key generation from fingerprints
-
Ya.N. Imamverdiev and L.V. Sukhostat, "A Method for Cryptographic Key Generation from Fingerprints," Automatic Control and Computer Sciences, Vol. 46, No. 2, pp. 66-75, 2012.
-
(2012)
Automatic Control and Computer Sciences
, vol.46
, Issue.2
, pp. 66-75
-
-
Imamverdiev, Ya.N.1
Sukhostat, L.V.2
-
4
-
-
84857767882
-
-
LNCS6805, Springer-Verlag
-
V. van der Leest, E. van der Sluis, G-J. Schrijen, P. Tuyls and H. Handschuh, "Efficient Implementation of True Random Number Generator Based on SRAM PUFs. Cryptography and Security: From Theory to Applications," LNCS6805, Springer-Verlag, pp. 300-318, 2012.
-
(2012)
Efficient Implementation of True Random Number Generator Based on SRAM PUFs. Cryptography and Security: From Theory to Applications
, pp. 300-318
-
-
Leest Der V.Van1
Sluis Der E.Van2
Schrijen, G.-J.3
Tuyls, P.4
Handschuh, H.5
-
6
-
-
84958527394
-
Performance analysis for puf data using fuzzy extractor
-
Springer-Verlag
-
H. Kang, Y. Hori, T. Katashita, M. Hagiwara and K. Iwamura, "Performance Analysis for PUF Data Using Fuzzy Extractor," Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering, Springer-Verlag, Vol.280, pp.277-284, 2014.
-
(2014)
Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering
, vol.280
, pp. 277-284
-
-
Kang, H.1
Hori, Y.2
Katashita, T.3
Hagiwara, M.4
Iwamura, K.5
-
7
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, "The importance of being random: statistical principles of iris recognition," Pattern Recognition, 279-291, 2003.
-
(2003)
Pattern Recognition
, pp. 279-291
-
-
Daugman, J.1
-
8
-
-
84858983365
-
Fixed initialization decoding of ldpc codes over a binary symmetric channel
-
M. Hagiwara, M.P.C. Fossorier and H. Imai, "Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel," IEEE Transactions on Information Theory, 58(4), 2321-2329, 2012.
-
(2012)
IEEE Transactions on Information Theory
, vol.58
, Issue.4
, pp. 2321-2329
-
-
Hagiwara, M.1
Fossorier, M.P.C.2
Imai, H.3
-
9
-
-
77953492364
-
Secure implementation of cryptographic modules-development of a standard evaluation environment for side channel attacks
-
A. Satoh, T. Katashita, H. Sakane, "Secure implementation of cryptographic modules-Development of a standard evaluation environment for side channel attacks-," Synthesiology-English edition, Vol. 3, No. 1, pp. 86-95, 2010.
-
(2010)
Synthesiology-English Edition
, vol.3
, Issue.1
, pp. 86-95
-
-
Satoh, A.1
Katashita, T.2
Sakane, H.3
|