Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …

Pseudorandomness

SP Vadhan - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
This is a survey of pseudorandomness, the theory of efficiently generating objects that" look
random" despite being constructed using little or no randomness. This theory has …

Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes

V Guruswami, C Umans, S Vadhan - Journal of the ACM (JACM), 2009 - dl.acm.org
We give an improved explicit construction of highly unbalanced bipartite expander graphs
with expansion arbitrarily close to the degree (which is polylogarithmic in the number of …

[图书][B] Algorithms and theory of computation handbook, volume 2: special topics and techniques

MJ Atallah, M Blanton - 2009 - books.google.com
This handbook provides an up-to-date compendium of fundamental computer science
topics, techniques, and applications. Along with updating and revising many of the existing …

[图书][B] Mathematics and computation: A theory revolutionizing technology and science

A Wigderson - 2019 - books.google.com
From the winner of the Turing Award and the Abel Prize, an introduction to computational
complexity theory, its connections and interactions with mathematics, and its central role in …

Fast polynomial factorization and modular composition

KS Kedlaya, C Umans - SIAM Journal on Computing, 2011 - SIAM
We obtain randomized algorithms for factoring degree n univariate polynomials over F_q
requiring O(n^1.5+o(1)\rmlog^1+o(1)q+n^1+o(1)\rmlog^2+o(1)q) bit operations. When …

Locally decodable codes

S Yekhanin - … and Trends® in Theoretical Computer Science, 2012 - nowpublishers.com
Locally decodable codes are a class of" error-correcting codes." Error-correcting codes help
to ensure reliability when transmitting information over noisy channels. They allow a sender …

[图书][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Generic reed-solomon codes achieve list-decoding capacity

J Brakensiek, S Gopi, V Makam - Proceedings of the 55th Annual ACM …, 2023 - dl.acm.org
In a recent paper, Brakensiek, Gopi and Makam introduced higher order MDS codes as a
generalization of MDS codes. An order-ℓ MDS code, denoted by MDS (ℓ), has the property …