Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is
challenging for low-cost resource-constrained embedded devices, with an attacker having …
challenging for low-cost resource-constrained embedded devices, with an attacker having …
A review on performance, security and various biometric template protection schemes for biometric authentication systems
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …
manner is called biometrics. The authentication system substituting traditional password and …
A survey on biometric cryptosystems and cancelable biometrics
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
Biometric template protection: Bridging the performance gap between theory and practice
K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …
control systems. Due to the strong and permanent link between individuals and their …
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …
information into keys usable for any cryptographic application, and reliably and securely …
[图书][B] Introduction to biometrics
A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …
into keys usable for any cryptographic application, and, in particular, reliably and securely …
Biometric template security: Challenges and solutions
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …
the authentication process. These attacks are intended to either circumvent the security …
A survey on lightweight entity authentication with strong PUFs
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
an Integrated Circuit (IC). Their input-output behavior serves as a unique IC “fingerprint.” …
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …
publicly known finite group G. Storage is private in the sense that an adversary does not …