Cryptology ePrint Archive: Report 2003/235

Available versions in chronological order


Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith

Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith

Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints
Yevgeniy Dodis and Leonid Reyzin and Adam Smith

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
Publication Info: Eurocrypt 2004 (shorter version)

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Leonid Reyzin and Adam Smith
Publication Info: Eurocrypt 2004 (shorter version)

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004.

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Publication Info: Preliminary version in Eurocrypt 2004. This version in SIAM J. Computing 38(1), 2008.


[ Cryptology ePrint archive ]