X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
From MaRDI portal
Publication:6547981
DOI10.1007/978-3-031-54770-6_8MaRDI QIDQ6547981
M. Conti, Riccardo Lazzeretti, Selcuk Uluagac, Alessandro Visintin, Edoardo Liberati
Publication date: 31 May 2024
Cites Work
- Secure key generation from biased PUFs
- Robustly reusable fuzzy extractor from standard assumptions
- Reusable fuzzy extractor from LWE
- A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction
- Reusable fuzzy extractors for low-entropy distributions
- Computational fuzzy extractors
- Reusable Fuzzy Extractors for Low-Entropy Distributions
- Computational Fuzzy Extractors
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- On the security of public key protocols
- Efficient, Reusable Fuzzy Extractors from LWE
- Advances in Cryptology - EUROCRYPT 2004
- Secure Remote Authentication Using Biometric Data
- Obfuscating Point Functions with Multibit Output
This page was built for publication: X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547981)