Back to Results
First PageMeta Content
Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics


An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR
Add to Reading List

Document Date: 2004-12-15 15:22:16


Open Document

File Size: 307,03 KB

Share Result on Facebook

City

Washington / DC / Palo Alto / /

/

Event

Product Issues / /

IndustryTerm

remote error tolerant authentication protocol / biometric authentication protocol / inner product / cryptographic machinery / biometric applications / /

Position

randomness extractor / modified fuzzy extractor / IND-Fuz-CPA / extractor / Fuz-CPA / fuzzy extractor / strong randomness extractor / JW-DRS fuzzy extractor / OW-Fuz-CPA / /

Product

inputs / /

ProgrammingLanguage

R / DC / C / K / D / /

Technology

biometric authentication protocol / private key / remote error tolerant authentication protocol / /

URL

http /

SocialTag