1. Adler A (2005) Vulnerabilities in biometric encryption systems. Audio- and video-based biometric person authentication (AVBPA), pp 1100–1109
2. Ballard L, Kamara S, Reiter MK (2008) The practical subtleties of biometric key generation. In: SS’08: Proceedings of the 17th conference on Security symposium, USENIX Association, Berkeley, pp 61–74
3. Boyen X (2004) Reusable cryptographic fuzzy extractors. In: CCS 2004 proceedings of the 11th ACM conference on computer and communications security. ACM Press, pp 82–91
4. Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ (2006) Fuzzy extractors for continuous distributions. Technical report, University of Twente
5. Buhan IR, Doumen J, Hartel P, Veldhuis RNJ (2007) Constructing practical fuzzy extractors usingqim. Tech. rep., Centre for Telematics and Information Technology, University of Twente, Netherland Technical Report TR-CTIT-07-52