Author of the publication

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.

, , , and . SIAM J. Comput., 38 (1): 97-139 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Traceability from Trace Amounts., , , , and . FOCS, page 650-669. IEEE Computer Society, (2015)Multiparty computation unconditionally secure against Q^2 adversary structures, and . CoRR, (1999)Information, Privacy and Stability in Adaptive Data Analysis.. CoRR, (2017)Distributed Differential Privacy via Mixnets., , , , and . CoRR, (2018)Manipulation Attacks in Local Differential Privacy., , and . CoRR, (2019)Private Analysis of Graph Structure., , , and . ACM Trans. Database Syst., 39 (3): 22:1-22:33 (2014)Efficient Consistency Proofs for Generalized Queries on a Committed Database., , and . ICALP, volume 3142 of Lecture Notes in Computer Science, page 1041-1053. Springer, (2004)Toward Privacy in Public Databases., , , , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 363-385. Springer, (2005)Distributed Differential Privacy via Shuffling., , , , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 375-403. Springer, (2019)Efficient Two Party and Multi Party Computation Against Covert Adversaries., , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 289-306. Springer, (2008)