[go: up one dir, main page]

Follow
Benjamin Fuller
Title
Cited by
Cited by
Year
Reusable Fuzzy Extractors for Low-Entropy Distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34 (1), 1-33, 2020
217*2020
SoK: Cryptographically Protected Database Search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
Proceedings of the 38th IEEE Symposium on Security and Privacy 1, 172-191, 2017
1812017
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation, 104602, 2020
1482020
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’Neill, L Reyzin
Journal of Cryptology 28 (3), 671-717, 2015
1102015
When are fuzzy extractors possible?
B Fuller, L Reyzin, A Smith
IEEE Transactions on Information Theory, 2020
812020
Catching MPC cheaters: Identification and openability
R Cunningham, B Fuller, S Yakoubov
International Conference on Information Theoretic Security, 110-134, 2017
492017
Cryptographic Authentication from the Iris
S Simhadri, J Steel, B Fuller
International Conference on Information Security, 465-485, 2019
47*2019
Unconstrained iris segmentation using convolutional neural networks
S Ahmad, B Fuller
Computer Vision–ACCV 2018 Workshops: 14th Asian Conference on Computer …, 2019
442019
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M van Dijk
Cryptography 1 (3), 23, 2017
402017
Pseudoentropic isometries: A new framework for fuzzy extractor reusability
Q Alamélou, PE Berthier, C Cachet, S Cauchie, B Fuller, P Gaborit, ...
AsiaCCS, 2018
382018
Thirdeye: Triplet based iris recognition without normalization
S Ahmad, B Fuller
2019 IEEE 10th International Conference on Biometrics Theory, Applications …, 2019
332019
Computational entropy and information leakage (MA Thesis)
B Fuller, L Reyzin
Computer Science Department, Boston University, 2011
33*2011
Iris Biometric Security Challenges and Possible Solutions: For your eyes only? Using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53, 2015
262015
Resist: Reconstruction of irises from templates
S Ahmad, B Fuller
2020 IEEE International Joint Conference on Biometrics (IJCB), 1-10, 2020
242020
Robust keys from physical unclonable functions
M Spain, B Fuller, K Ingols, R Cunningham
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
232014
Unifying leakage classes: Simulatable leakage and pseudoentropy
B Fuller, A Hamlin
Information Theoretic Security: 8th International Conference, ICITS 2015 …, 2015
192015
Proximity Searchable Encryption for the Iris Biometric
C Cachet, S Ahmad, L Demarest, A Hamlin, B Fuller
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
15*2022
Continuous-Source Fuzzy Extractors: Source uncertainty and security
B Fuller, L Peng
IEEE International Symposium on Information Theory, 2019
152019
Nonmalleable digital lockers and robust fuzzy extractors in the plain model
D Apon, C Cachet, B Fuller, P Hall, FH Liu
Advances in Cryptology–ASIACRYPT 2022: 28th International Conference on the …, 2023
132023
Same Point Composable and Nonmalleable Obfuscated Point Functions
P Fenteany, B Fuller
International Conference on Applied Cryptography and Network Security, 124-144, 2020
13*2020
The system can't perform the operation now. Try again later.
Articles 1–20