Pages that link to "Item:Q3614152"
From MaRDI portal
The following pages link to Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data (Q3614152):
Displaying 50 items.
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- A counterexample to the chain rule for conditional HILL entropy (Q332268) (← links)
- Deciding unique decodability of bigram counts via finite automata (Q386046) (← links)
- Effective error-tolerant keyword search for secure cloud computing (Q458133) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- Obfuscating conjunctions (Q514475) (← links)
- Sharp lower bounds on the extractable randomness from non-uniform sources (Q719242) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Pursuit and synchronization in hydrodynamic dipoles (Q745971) (← links)
- Robustly reusable fuzzy extractor with imperfect randomness (Q831183) (← links)
- HalftimeHash: modern hashing without 64-bit multipliers or finite fields (Q832844) (← links)
- A performance driven methodology for cancelable face templates generation (Q969104) (← links)
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- Secure computation using leaky correlations (asymptotically optimal constructions) (Q1631316) (← links)
- Two-message statistically sender-private OT from LWE (Q1631337) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Quasi chain rule for min-entropy (Q1707982) (← links)
- Robustly reusable fuzzy extractor from standard assumptions (Q1710686) (← links)
- Optimal attacks on qubit-based quantum key recycling (Q1746889) (← links)
- Incremental deterministic public-key encryption (Q1747660) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption (Q1791666) (← links)
- Binding cryptographic keys into biometric data: optimization (Q1995355) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- New approach to practical leakage-resilient public-key cryptography (Q2023806) (← links)
- Reusable fuzzy extractors for low-entropy distributions (Q2032056) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- Extracting randomness from extractor-dependent sources (Q2055613) (← links)
- Low error efficient computational extractors in the CRS model (Q2055616) (← links)
- The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free (Q2056741) (← links)
- Multi-source non-malleable extractors and applications (Q2056748) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Simple multi-party set reconciliation (Q2075624) (← links)
- Incompressible encodings (Q2096497) (← links)
- Rounding in the rings (Q2096527) (← links)
- Hardness of LWE on general entropic distributions (Q2119024) (← links)
- Non-malleable functions and their applications (Q2121503) (← links)
- Improved computational extractors and their applications (Q2129010) (← links)
- Adaptive extractors and their application to leakage resilient secret sharing (Q2129011) (← links)
- Targeted lossy functions and applications (Q2139643) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Asymptotically quasi-optimal cryptography (Q2170004) (← links)
- Authentication in the bounded storage model (Q2170109) (← links)
- Secure non-interactive simulation: feasibility and rate (Q2170112) (← links)
- Feasibility and infeasibility of secure computation with malicious PUFs (Q2175217) (← links)
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems (Q2175905) (← links)