The Implementation of Fuzzy Extractor is Not Hard to Do : An Approach Using PUF Data
暂无分享,去创建一个
[1] Ya. N. Imamverdiev,et al. A method for cryptographic key generation from fingerprints , 2012, Automatic Control and Computer Sciences.
[2] Helena Handschuh,et al. Efficient Implementation of True Random Number Generator Based on SRAM PUFs , 2012, Cryptography and Security.
[3] Akashi Satoh,et al. Development of a standard evaluation environment for side channel attacks - , .
[4] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[5] Jean-Jacques Quisquater,et al. How to strongly link data and its medium: the paper case , 2010, IET Inf. Secur..