Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Top Cited Papers
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
All Related Versions
This publication has 17 references indexed in Scilit:
- New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric TemplatesPublished by Springer Nature ,2003
- Error-tolerant password recoveryPublished by Association for Computing Machinery (ACM) ,2001
- Protecting secret keys with personal entropyFuture Generation Computer Systems, 2000
- Upper bounds for constant-weight codesIEEE Transactions on Information Theory, 2000
- A fuzzy commitment schemePublished by Association for Computing Machinery (ACM) ,1999
- Secure applications of low-entropy keysPublished by Springer Nature ,1998
- Efficient Cryptographic Protocols Based on Noisy ChannelsPublished by Springer Nature ,1997
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- A new table of constant weight codesIEEE Transactions on Information Theory, 1990
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988