Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Top Cited Papers
- 1 January 2004
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
Other Versions
This publication has 17 references indexed in Scilit:
- New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric TemplatesLecture Notes in Computer Science, 2003
- Error-tolerant password recoveryPublished by Association for Computing Machinery (ACM) ,2001
- Protecting secret keys with personal entropyFuture Generation Computer Systems, 2000
- Upper bounds for constant-weight codesIEEE Transactions on Information Theory, 2000
- A fuzzy commitment schemePublished by Association for Computing Machinery (ACM) ,1999
- Secure applications of low-entropy keysPublished by Springer Science and Business Media LLC ,1998
- Efficient Cryptographic Protocols Based on Noisy ChannelsLecture Notes in Computer Science, 1997
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- A new table of constant weight codesIEEE Transactions on Information Theory, 1990
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988