Benjamin Fuller
Titel
Citeras av
Citeras av
År
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’Neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
942015
SoK: Cryptographically Protected Database Search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
Proceedings of the 38th IEEE Symposium on Security and Privacy 1, 172-191, 2017
852017
Reusable Fuzzy Extractors for Low-Entropy Distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34 (1), 1-33, 2020
83*2020
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation, 104602, 2020
73*2020
Computational entropy and information leakage (MA Thesis)
B Fuller, L Reyzin
Computer Science Department, Boston University, 2011
28*2011
Iris Biometric Security Challenges and Possible Solutions: For your eyes only? Using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53, 2015
172015
Pseudoentropic isometries: A new framework for fuzzy extractor reusability
Q Alamélou, PE Berthier, C Cachet, S Cauchie, B Fuller, P Gaborit, ...
AsiaCCS, 2018
162018
Robust keys from physical unclonable functions
M Spain, B Fuller, K Ingols, R Cunningham
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
162014
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M van Dijk
Cryptography 1 (3), 23, 2017
152017
Cryptographic Authentication from the Iris
S Simhadri, J Steel, B Fuller
International Conference on Information Security, 465-485, 2019
14*2019
Unifying leakage classes: Simulatable leakage and pseudoentropy
B Fuller, A Hamlin
International Conference on Information Theoretic Security, 69-86, 2015
132015
Catching MPC cheaters: Identification and openability
R Cunningham, B Fuller, S Yakoubov
International Conference on Information Theoretic Security, 110-134, 2017
92017
Public Key Cryptosystems with Noisy Secret Keys
C Herder, B Fuller, M van Dijk, S Devadas
92017
GROK: A practical system for securing group communications
JA Cooley, RI Khazan, BW Fuller, GE Pickard
2010 Ninth IEEE International Symposium on Network Computing and …, 2010
92010
Unconstrained Iris Segmentation Using Convolutional Neural Networks
S Ahmad, B Fuller
Asian Conference on Computer Vision, 450-466, 2018
82018
Integrated Environment Management for Information Operations Testbeds
TH Yu, BW Fuller, JH Bannick, LM Rossey, RK Cunningham
VizSEC 2007, 67-83, 2008
72008
When are fuzzy extractors possible?
B Fuller, L Reyzin, A Smith
IEEE Transactions on Information Theory, 2020
62020
ThirdEye: Triplet Based Iris Recognition without Normalization
S Ahmad, B Fuller
arXiv preprint arXiv:1907.06147, 2019
62019
Continuous-Source Fuzzy Extractors: Source uncertainty and security
B Fuller, L Peng
IEEE International Symposium on Information Theory, 2019
42019
GROK Secure multi-user Chat at Red Flag 2007-03
R Khazan, J Cooley, G Pickard, B Fuller
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
42008
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20