Efficient, Reusable Fuzzy Extractors from LWE
暂无分享,去创建一个
Jonathan Katz | Daniel Apon | Karim M. El Defrawy | Chongwon Cho | Jonathan Katz | Daniel Apon | Chongwon Cho
[1] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[2] Amit Sahai,et al. Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.
[3] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[4] David Zuckerman,et al. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .
[5] Vinod Vaikuntanathan,et al. Simultaneous Hardcore Bits and Cryptography against Memory Attacks , 2009, TCC.
[6] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Yael Tauman Kalai,et al. Robustness of the Learning with Errors Assumption , 2010, ICS.
[8] Marina Blanton,et al. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.
[9] Nico Döttling,et al. Lossy Codes and a New Variant of the Learning-With-Errors Problem , 2013, EUROCRYPT.
[10] Marina Blanton,et al. Analysis of Reusability of Secure Sketches and Fuzzy Extractors , 2013, IEEE Transactions on Information Forensics and Security.
[11] Leonid Reyzin,et al. Computational Fuzzy Extractors , 2013, ASIACRYPT.
[12] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[13] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[14] Omer Paneth,et al. Reusable Fuzzy Extractors for Low-Entropy Distributions , 2016, Journal of Cryptology.
[15] Stéphane Cauchie,et al. Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors , 2016, IACR Cryptol. ePrint Arch..
[16] Tim Güneysu,et al. Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT , 2016, IACR Cryptol. ePrint Arch..
[17] Srinivas Devadas,et al. Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.