Iris Biometric Cryptography for Identity Document
FREE-DOWNLOAD SH Moi, NBA Rahim, P Saad, PL Sim… – … Conference of Soft …, Abstract—Currently, it is noticed that users tend to choose shorter password as their authentication which can be easily attacked. Biometric technologies such as fingerprint scanning, voice authentication, face recognition, signature, hand geometry and iris recognition is now
Symmetric extendibility for qudits and tolerable error rates in quantum cryptography
FREE-DOWNLOAD KS Ranade – Physical Review A, 2009 Symmetric extendibility of quantum states has recently drawn attention in the context of quantum cryptography to judge whether quantum states shared between two distant parties can be purified by means of one-way error correction protocols. In this paper we study the symmetric
Provable security for physical cryptography
FREE-DOWNLOAD K Pietrzak – the proceedings of WEWORC, 2009 – Abstract. The modern approach to cryptography is provable security, where one defines a meaningful formal security model and proves that schemes are secure in this model. An exception is the design of countermeasures against cryptographic side- channel attacks, which even