Author:
Kim Aeyoung,Seo Seung-Hyun
Reference15 articles.
1. Yi H (2018) Under quantum computer attack: is rainbow a replacement of RSA and elliptic curves on hardware? Secur Commun Netw
2. Ding J, Schmidt D (2005) Rainbow, a new multivariable polynomial signature scheme. In: International conference on applied cryptography and network security. Springer, Heidelberg, pp 164–175
3. Davida GI, Frankel Y, Matt B (1998) On enabling secure applications through offline biometric identification. In: IEEE international symposium on security and privacy. IEEE Press, pp 148–157
4. Feng H, Wah CC (2002) Private key generation from on-line handwritten signatures. Inf Manag Comput Secur 10:159–164
5. Li Q, Guo M, Chang EC (2008) Fuzzy extractors for asymmetric biometric representations. In: 2008 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE Press, pp 1–6