Author:
Wen Yunhua,Liu Shengli,Han Shuai
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference40 articles.
1. Alamélou Q., Berthier P., Cauchie S., Gaborit P.: Practical reusable fuzzy extractors for the set difference metric and adaptive fuzzy extractors. IACR Cryptology ePrint Archive 2016, 1100 (2016). http://eprint.iacr.org/2016/1100 .
2. Apon D., Cho C., Eldefrawy K., Katz J.: Efficient, reusable fuzzy extractors from LWE. In: Proceedings of the Cyber Security Cryptography and Machine Learning—First International Conference, CSCML 2017, Beer-Sheva, Israel, 29–30 June 2017, pp. 1–18 (2017). https://doi.org/10.1007/978-3-319-60080-2_1 .
3. Bennett C.H., DiVincenzo D.P.: Quantum information and computation. Nature 404(6775), 247–255 (2000).
4. Bennett C.H., Brassard G., Robert J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210–229 (1988).
5. Bennett C.H., Brassard G., Crépeau C., Maurer U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923 (1995).
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献