Abstract
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined information-theoretically, with gaps between known negative ......
小提示:本篇文献需要登录阅读全文,点击跳转登录