Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction
暂无分享,去创建一个
[1] Victor Shoup,et al. On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.
[2] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[3] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[4] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[5] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[6] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Boris Skoric,et al. Robust Key Extraction from Physical Uncloneable Functions , 2005, ACNS.
[8] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[9] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[10] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[11] Moni Naor,et al. Non-Malleable Cryptography (Extended Abstract) , 1991, STOC 1991.
[12] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[13] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[14] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[15] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[16] Jorge Guajardo,et al. Extended abstract: The butterfly PUF protecting IP on every FPGA , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.
[17] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[18] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[19] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[20] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[21] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[22] Jorge Guajardo,et al. FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.
[23] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[24] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[25] Berk Sunar,et al. Energy scalable universal hashing , 2005, IEEE Transactions on Computers.
[26] Mihir Bellare,et al. Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography , 2000, ASIACRYPT.
[27] Bart Preneel,et al. Software Performance of Universal Hash Functions , 1999, EUROCRYPT.
[28] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[29] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[30] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[31] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[32] Anton H. M. Akkermans,et al. A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.
[33] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[34] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[35] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[36] G.-J. Schrijen,et al. Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection , 2007, 2007 International Conference on Field Programmable Logic and Applications.