메뉴 건너뛰기




Volumn , Issue , 2014, Pages 23-26

Cryptographie key generation from PUF data using efficient fuzzy extractors

Author keywords

Arbiter PUF; Fuzzy Extractor; Physical Unclonable Functions

Indexed keywords

BIOMETRICS; COMMUNICATION SYSTEMS; ERROR CORRECTION; HAMMING DISTANCE; HASH FUNCTIONS;

EID: 84898979224     PISSN: 17389445     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICACT.2014.6778915     Document Type: Conference Paper
Times cited : (79)

References (9)
  • 1
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," (a preliminary version of this paper appeared in eurocrypt 2004)
    • Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," (A preliminary version of this paper appeared in Eurocrypt 2004) SIAM J. Comput., 38(1), pp. 97-139, 2008.
    • (2008) SIAM J. Comput , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 2
    • 77957133407 scopus 로고    scopus 로고
    • How to strongly link data and its medium: The paper case
    • P. Bulens, F.-X. Standaert and J.-J. Quisquater, "How to strongly link data and its medium: the paper case," IET Inf. Secur., Vol. 4, Iss. 3, pp. 125-136, 2010.
    • (2010) IET Inf. Secur , vol.4 , Issue.3 , pp. 125-136
    • Bulens, P.1    Standaert, F.-X.2    Quisquater, J.-J.3
  • 7
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman, "The importance of being random: statistical principles of iris recognition," Pattern Recognition, 279-291, 2003.
    • (2003) Pattern Recognition , pp. 279-291
    • Daugman, J.1
  • 8
    • 84858983365 scopus 로고    scopus 로고
    • Fixed initialization decoding of ldpc codes over a binary symmetric channel
    • M. Hagiwara, M.P.C. Fossorier and H. Imai, "Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel," IEEE Transactions on Information Theory, 58(4), 2321-2329, 2012.
    • (2012) IEEE Transactions on Information Theory , vol.58 , Issue.4 , pp. 2321-2329
    • Hagiwara, M.1    Fossorier, M.P.C.2    Imai, H.3
  • 9
    • 77953492364 scopus 로고    scopus 로고
    • Secure implementation of cryptographic modules-development of a standard evaluation environment for side channel attacks
    • A. Satoh, T. Katashita, H. Sakane, "Secure implementation of cryptographic modules-Development of a standard evaluation environment for side channel attacks-," Synthesiology-English edition, Vol. 3, No. 1, pp. 86-95, 2010.
    • (2010) Synthesiology-English Edition , vol.3 , Issue.1 , pp. 86-95
    • Satoh, A.1    Katashita, T.2    Sakane, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.