{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:25:32Z","timestamp":1725899132136},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_5","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:59:28Z","timestamp":1367467168000},"page":"60-68","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Fuzzy Extractor without ECCs"],"prefix":"10.1007","author":[{"given":"Jintao","family":"Yao","sequence":"first","affiliation":[]},{"given":"Kangshun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","first-page":"5","volume-title":"2nd USENIX Workshop on Security (USENIX 1990)","author":"D.V. Klein","year":"1990","unstructured":"Klein, D.V.: Foiling the attacker-A survey of, and improvement to, password security. In: 2nd USENIX Workshop on Security (USENIX 1990), pp. 5\u201314. USENIX Association, Portland (1990)"},{"issue":"11","key":"5_CR2","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: A case history. Communications of the ACM\u00a022(11), 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"key":"5_CR3","unstructured":"Huff, P.D.: Fuzzy Extractors Using an Improved Set Intersection Function. Technical Report, James Madison University, Computer Science, USA (2008)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/982507.982516","volume-title":"ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop","author":"T.C. Clancy","year":"2003","unstructured":"Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure smartcard-based fingerprint authentication. In: ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45\u201352. ACM Press, New York (2003)"},{"issue":"6","key":"5_CR5","first-page":"948","volume":"92","author":"U. Uludag","year":"2004","unstructured":"Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric Cryptosystems: Issues and Challenges. IEEE Transaction on Multimedia Security for Digital Rights Management\u00a092(6), 948\u2013960 (2004)","journal-title":"IEEE Transaction on Multimedia Security for Digital Rights Management"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Designs, Codes and Cryptography\u00a038(2), 237\u2013257 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"5_CR7","first-page":"28","volume-title":"6th ACM Conference on Computer and Communication Security","author":"A. Juels","year":"1999","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: 6th ACM Conference on Computer and Communication Security, pp. 28\u201336. ACM Press, New York (1999)"},{"key":"5_CR8","first-page":"82","volume-title":"11th ACM Conference on Computer and Communications Security","author":"X. Boyen","year":"2004","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: 11th ACM Conference on Computer and Communications Security, pp. 82\u201391. ACM Press, Washington (2004)"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y. Dodis","year":"2007","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing\u00a038(1), 97\u2013139 (2007)","journal-title":"SIAM Journal on Computing"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 147\u2013163. Springer, Heidelberg (2005)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/11818175_14","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"Y. Dodis","year":"2006","unstructured":"Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 232\u2013250. Springer, Heidelberg (2006)"},{"key":"5_CR12","first-page":"28","volume-title":"30th Symposium on Information Theory on the Benelux","author":"B. Skoric","year":"2009","unstructured":"Skoric, B., Tuyls, P.: An efficient fuzzy extractor for limited noise. In: 30th Symposium on Information Theory on the Benelux, pp. 28\u201329. IEEE Press, New York (2009)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-540-78967-3_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"R. Cramer","year":"2008","unstructured":"Cramer, R., Dodis, Y., Fehr, S., Padr\u00f3, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 471\u2013488. Springer, Heidelberg (2008)"},{"issue":"8","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.ic.2011.06.001","volume":"209","author":"B. Skoric","year":"2011","unstructured":"Skoric, B., Obi, C., Verbitskiy, E., Schoenmakers, B.: Sharp lower bounds on the extractable randomness from non-uniform sources. Information and Computation\u00a0209(8), 1184\u20131196 (2011)","journal-title":"Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:12:42Z","timestamp":1557673962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}