1. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy. In: EUROCRYPT, pp. 523–540 (2004)
2. Chmorra, A.L.: Key masking using biometrics. (Maskirovka klyucha s pomoshch’yu biometrii). Inf. Transm. Probl. 2(47), 128–143 (2011)
3. GOST R 52633.0-2006: Information security. Information security technology. Requirements for means of highly reliable biometric authentication (Zashchita informatsii. Tekhnika zashchity informatsii. Trebovaniya k sredstvam vysokonadezhnoi biometricheskoi autentifikatsii). Standartinform, Moscow (2006)
4. GOST R 52633.5-2011: Information security. Information security technology. Automatic training of neural network converters biometrics-access code (Zashchita informatsii. Tekhnika zashchity informatsii. Avtomaticheskoe obuchenie neirosetevykh preobrazovatelei biometriya-kod dostupa). Standartinform, Moscow (2011)
5. GOST R 52633.3-2011: Information security. Information security technology. Testing the resistance of highly reliable biometric protection to brute force attacks (Zashchita informatsii. Tekhnika zashchity informatsii. Testirovanie stoikosti sredstv vysokonadezhnoi biometricheskoi zashchity k atakam podbora). Standartinform, Moscow (2011)