Author of the publication

On Security of Fuzzy Commitment Scheme for Biometric Authentication.

, , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 399-419. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Indifferentiability Security Analysis of chopMD Hash Function., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 429-443. Springer, (2008)Finding Collision on 45-Step HAS-160., , , , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 146-155. Springer, (2005)A new authenticated encryption technique for handling long ciphertexts in memory constrained devices., , and . Int. J. Appl. Cryptogr., 3 (3): 236-261 (2017)Threshold Implementations of <tt>GIFT</tt>: A Trade-Off Analysis., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Deterministic Authenticated Encryption Scheme for Memory Constrained Devices., , and . Cryptogr., 2 (4): 37 (2018)Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash.. IACR Cryptology ePrint Archive, (2006)Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006.. IACR Cryptology ePrint Archive, (2006)Preimage Attack on Hashing with Polynomials proposed at ICISC'06.. IACR Cryptology ePrint Archive, (2006)Adaptive Preimage Resistance Analysis Revisited: \\ Requirements, Subtleties and Implications., and . IACR Cryptology ePrint Archive, (2012)Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function., , , , and . IACR Cryptology ePrint Archive, (2007)