no code implementations • 26 Oct 2012 • Kyle Marshall, Davide Schipani, Anna-Lena Trautmann, Joachim Rosenthal
Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets.
Information Theory Cryptography and Security Information Theory
no code implementations • 11 Aug 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutation-equivalent to the secret code.
Information Theory Cryptography and Security Information Theory
no code implementations • 8 Jul 2011 • Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani
The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e. g. for the purpose of biometric authentication.
Information Theory Cryptography and Security Information Theory