References
- G. B. Agnew, 'Ransom sources for cryptographic systems,' Eurocrypt'87, Springer-Verlag, LNCS Vol.304, pp.77-81, 1988
- L. Blum, M. Blum and M. Shub, 'A simple unpredictable pseudo random generator,' SIAM Journal on Computing, 15, pp.364-383, 1986 https://doi.org/10.1137/0215025
- D. Davis, R. Ihaka and P. Fenstermacher, 'Cryptographic randomness from air turbulence in disk drives,' Crypto'94, Springer-Verlag, LNCS Vol.839, pp.114-120, 1994
- FIPS 186, 'Digital signature standard,' Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994
- J. Hastad, 'Pseudo random number generators under uniform assumptions,' In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990 https://doi.org/10.1145/100216.100270
- M. Jakobsson, E. Shriver, B. K. Hillyer and A. Juels, 'A practical secure Random bit generator,' ACM Conference on Computer and Communications Security, pp.103-111, 1998 https://doi.org/10.1145/288090.288114
- L. Hong, Y. Wan and A. K. Jain, 'Fingerprint enhancement : algorithm and performance evaluation,' IEEE Trans. Pattern Anal. Mach. Intell., 20, p.777, 1998 https://doi.org/10.1109/34.709565
- J. B. Lacy, D. P. Mitchell and W. M. Schell, 'Cryptolib : Cryptography in software,' In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993
- M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996
- D. Mario and D. Maltoni, 'Direct Gray-Scale Minutiae Detection In Fingerprints,' IEEE Trans. Pattern Analysis and Machine Intelligence, Vol.19, No.1, pp.27-40, 1997 https://doi.org/10.1109/34.566808
- S. Micali and C. P. Schnorr, 'Efficient perfect polynomial random number generators,' Journal of Cryptology, 3, pp.157-172, 1991 https://doi.org/10.1007/BF00196909
- NIST Special Publication 800-12, A statistical test suite for random and pseudorandom number generators for cryptographic applications, 2000
- RSA Data Security, Inc., 'RSA Secure PC for Windows95 Users Manual,' 1997
- A. Shamir, 'On the generation of cryptographically strong pseudorandom sequences,' ACM Transactions on Computer Science, pp.38-44, 1983 https://doi.org/10.1145/357353.357357
- M. R. Verma, A. K. Majumdar and B. Chatterjeee, 'Edge detection in fingerprints,' Pattern Recognition 20, p.513, 1987 https://doi.org/10.1016/0031-3203(87)90078-1
- D. M. Weber, 'A cost effective fingerprint verification algorithm for commercial application,' Proceedings of the South African Symposium on Communication and Signal Processing, p.9, 1992 https://doi.org/10.1109/COMSIG.1992.274304
Cited by
- Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack vol.17D, pp.2, 2010, https://doi.org/10.3745/KIPSTD.2010.17D.2.167