Cryptology ePrint Archive: Report 2003/235
Available versions in chronological order
20031110:183149 (posted 10-Nov-2003 18:31:49 UTC)
Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
20031111:153134 (posted 11-Nov-2003 15:31:34 UTC)
Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
20031111:153320 (posted 11-Nov-2003 15:33:20 UTC)
Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
20040413:182224 (posted 13-Apr-2004 18:22:24 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
Publication Info: Eurocrypt 2004 (shorter version)
20040413:182509 (posted 13-Apr-2004 18:25:09 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
Publication Info: Eurocrypt 2004 (shorter version)
20060205:155106 (posted 05-Feb-2006 15:51:06 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.
20060428:164350 (posted 28-Apr-2006 16:43:50 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.
20070921:030144 (posted 21-Sep-2007 03:01:44 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.
20080401:165042 (posted 01-Apr-2008 16:50:42 UTC)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004. This version in SIAM J. Computing 38(1), 2008.
[
Cryptology ePrint archive
]