Reusable and robust fuzzy extractor for CRS-dependent sources
Y Ma, P Shen, X Tian, K Lv, C Chen - Cybersecurity, 2025 - Springer
Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a
noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the …
noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the …
FiveEyes: Cryptographic Biometric Authentication from the Iris
Despite decades of effort, a stubborn chasm exists between the theory and practice of
device-level biometric authentication. Deployed authentication algorithms rely on data that …
device-level biometric authentication. Deployed authentication algorithms rely on data that …