Author:
Canetti Ran,Fuller Benjamin,Paneth Omer,Reyzin Leonid,Smith Adam
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference69 articles.
1. Q. Alamélou, P.-E. Berthier, C. Cachet, S. Cauchie, B. Fuller, P. Gaborit, S. Simhadri, Pseudoentropic isometries: a new framework for fuzzy extractor reusability, in Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ACM, 2018), pp. 673–684
2. D. Apon, C. Cho, K. Eldefrawy, and J. Katz, Efficient, reusable fuzzy extractors from LWE, in International Conference on Cyber Security Cryptography and Machine Learning (Springer, Berlin, 2017), pp. 1–18
3. R. Ash, Information Theory (Interscience Publishers, Geneva, 1965)
4. M. Blanton and M. Aliasgari, On the (non-) reusability of fuzzy sketches and extractors and security improvements in the computational setting, in IACR Cryptology ePrint Archive, vol. 2012 (2012), p. 608
5. M. Blanton and M. Aliasgari, Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9–10), 1433–1445 (2013)
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献