Key masking using biometry
From MaRDI portal
Recommendations
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- An algorithm for cryptographic key keeping and generation based on fingerprint features
- scientific article; zbMATH DE number 2089662
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
Cites work
- scientific article; zbMATH DE number 5320229 (Why is no real title available?)
- scientific article; zbMATH DE number 1979282 (Why is no real title available?)
- scientific article; zbMATH DE number 1559526 (Why is no real title available?)
- A fuzzy vault scheme
- Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression
- Hardness of approximating the minimum distance of a linear code
- Improved decoding of Reed-Solomon and algebraic-geometry codes
- Maximum-Likelihood Decoding of Reed–Solomon Codes is NP-Hard
- On the complexity of minimum distance decoding of long linear codes
- On the inherent intractability of certain coding problems (Corresp.)
- Password hardening based on keystroke dynamics
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Selecting cryptographic key sizes
- The intractability of computing the minimum distance of a code
Cited in
(2)
This page was built for publication: Key masking using biometry
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q764394)