Performance Analysis for PUF Data Using Fuzzy Extractor
暂无分享,去创建一个
[1] David Naccache,et al. Cryptography and Security: From Theory to Applications , 2012, Lecture Notes in Computer Science.
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Akashi Satoh,et al. Secure implementation of cryptographic modules , 2010 .
[4] Ya. N. Imamverdiev,et al. A method for cryptographic key generation from fingerprints , 2012, Automatic Control and Computer Sciences.
[5] Jean-Jacques Quisquater,et al. How to strongly link data and its medium: the paper case , 2010, IET Inf. Secur..
[6] Helena Handschuh,et al. Efficient Implementation of True Random Number Generator Based on SRAM PUFs , 2012, Cryptography and Security.
[7] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .