Skip to search formSkip to main contentSkip to account menu

Fuzzy extractor

Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
This paper presents an efficient cryptographic key generation from ternary physically unclonable functions (PUFs). The basic… 
2016
2016
This paper describes an approach to integrate unstructured and structured data and provide a natural language query interface to… 
2015
2015
Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in… 
2014
2014
Purpose: To standardise the methanol and aqueous extracts of Ficus deltoidea leaf by developing a reverse phase high performance… 
2013
2013
Recently, An pointed out the weaknesses of Das's three-factor remote user authentication scheme, and proposed an improved… 
2013
2013
............................................................................................................................. ii… 
2009
2009
Summary Whole plant of Cajanus Scarabaeoides (L) were dried, powdered and successively extracted with petroleum ether, chloroform… 
2009
2009
The fruits of Hylocereus cacti, known as red pitaya, have recently drawn much attention of growers worldwide, not only because of… 
2008
2008
Virtually all applications which provide or require a security service need a secret key. In an ambient world, where (potentially… 
2007
2007
Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the…