↓ Skip to main content

Advances in Cryptology - EUROCRYPT 2004

Overview of attention for book
Advances in Cryptology - EUROCRYPT 2004
Springer Science & Business Media

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Efficient Private Matching and Set Intersection
  3. Altmetric Badge
    Chapter 2 Positive Results and Techniques for Obfuscation
  4. Altmetric Badge
    Chapter 3 Secure Computation of the k th -Ranked Element
  5. Altmetric Badge
    Chapter 4 Short Signatures Without Random Oracles
  6. Altmetric Badge
    Chapter 5 Sequential Aggregate Signatures from Trapdoor Permutations
  7. Altmetric Badge
    Chapter 6 On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
  8. Altmetric Badge
    Chapter 7 The Exact Price for Unconditionally Secure Asymmetric Cryptography
  9. Altmetric Badge
    Chapter 8 On Generating the Initial Key in the Bounded-Storage Model
  10. Altmetric Badge
    Chapter 9 Practical Large-Scale Distributed Key Generation
  11. Altmetric Badge
    Chapter 10 Optimal Communication Complexity of Generic Multicast Key Distribution
  12. Altmetric Badge
    Chapter 11 An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
  13. Altmetric Badge
    Chapter 12 Black-Box Composition Does Not Imply Adaptive Security
  14. Altmetric Badge
    Chapter 13 Chosen-Ciphertext Security from Identity-Based Encryption
  15. Altmetric Badge
    Chapter 14 Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
  16. Altmetric Badge
    Chapter 15 Construction of Secure Random Curves of Genus 2 over Prime Fields
  17. Altmetric Badge
    Chapter 16 Projective Coordinates Leak
  18. Altmetric Badge
    Chapter 17 Security Proofs for Identity-Based Identification and Signature Schemes
  19. Altmetric Badge
    Chapter 18 Concurrent Signatures
  20. Altmetric Badge
    Chapter 19 The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
  21. Altmetric Badge
    Chapter 20 Public-Key Steganography
  22. Altmetric Badge
    Chapter 21 Immunizing Encryption Schemes from Decryption Errors
  23. Altmetric Badge
    Chapter 22 Secure Hashed Diffie-Hellman over Non-DDH Groups
  24. Altmetric Badge
    Chapter 23 On Simulation-Sound Trapdoor Commitments
  25. Altmetric Badge
    Chapter 24 Hash Function Balance and Its Impact on Birthday Attacks
  26. Altmetric Badge
    Chapter 25 Multi-party Computation with Hybrid Security
  27. Altmetric Badge
    Chapter 26 On the Hardness of Information-Theoretic Multiparty Computation
  28. Altmetric Badge
    Chapter 27 Dining Cryptographers Revisited
  29. Altmetric Badge
    Chapter 28 Algebraic Attacks and Decomposition of Boolean Functions
  30. Altmetric Badge
    Chapter 29 Finding Small Roots of Bivariate Integer Polynomial Equations Revisited
  31. Altmetric Badge
    Chapter 30 Public Key Encryption with Keyword Search
  32. Altmetric Badge
    Chapter 31 Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
  33. Altmetric Badge
    Chapter 32 Merkle Tree Traversal in Log Space and Time
  34. Altmetric Badge
    Chapter 33 Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3
  35. Altmetric Badge
    Chapter 34 Traceable Signatures
  36. Altmetric Badge
    Chapter 35 Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
  37. Altmetric Badge
    Chapter 36 Anonymous Identification in Ad Hoc Groups
Attention for Chapter 31: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Altmetric Badge

Mentioned by

twitter
15 X users
patent
2 patents
wikipedia
2 Wikipedia pages

Citations

dimensions_citation
51 Dimensions

Readers on

mendeley
138 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Chapter number 31
Book title
Advances in Cryptology - EUROCRYPT 2004
Published by
Springer, Berlin, Heidelberg, May 2004
DOI 10.1007/978-3-540-24676-3_31
Book ISBNs
978-3-54-021935-4, 978-3-54-024676-3
Authors

Yevgeniy Dodis, Leonid Reyzin, Adam Smith, Dodis, Yevgeniy, Reyzin, Leonid, Smith, Adam

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

X Demographics

X Demographics

The data shown below were collected from the profiles of 15 X users who shared this research output. Click here to find out more about how the information was compiled.
As of 1 July 2024, you may notice a temporary increase in the numbers of X profiles with Unknown location. Click here to learn more.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 138 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 1%
Germany 1 <1%
Malaysia 1 <1%
Switzerland 1 <1%
India 1 <1%
France 1 <1%
Unknown 131 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 45 33%
Student > Master 19 14%
Researcher 13 9%
Student > Postgraduate 8 6%
Student > Bachelor 6 4%
Other 18 13%
Unknown 29 21%
Readers by discipline Count As %
Computer Science 69 50%
Engineering 24 17%
Physics and Astronomy 3 2%
Business, Management and Accounting 2 1%
Mathematics 2 1%
Other 5 4%
Unknown 33 24%