A trivial debiasing scheme for Helper Data Systems
暂无分享,去创建一个
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] David Naccache,et al. Towards Hardware-Intrinsic Security - ReadingSample , 2017 .
[3] Wei Wu,et al. Entropy loss in PUF-based key generation schemes: The repetition code pitfall , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[4] Roel Maes,et al. Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.
[5] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[6] Srinivas Devadas,et al. Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.
[7] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[8] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[9] Blaise L. P. Gassend,et al. Physical random functions , 2003 .
[10] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[11] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[12] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[13] Boris Skoric,et al. The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.
[14] Gilles Brassard,et al. Practical Quantum Oblivious Transfer , 1991, CRYPTO.
[15] Frans M. J. Willems,et al. Secure Key Generation from Biased PUFs , 2015, CHES.
[16] Boris Skoric,et al. Read-Proof Hardware from Protective Coatings , 2006, CHES.
[17] George Pâolya,et al. Applied Combinatorial Mathematics , 1964 .
[18] K. A. Rybnikov,et al. Applied Combinatorial Mathematics , 1964 .
[19] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[20] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[21] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[22] Omer Paneth,et al. Reusable Fuzzy Extractors for Low-Entropy Distributions , 2016, Journal of Cryptology.