References
- RSA data Security, "Inc-RSA secure PC for windows 55 Users Manual." 1997
- J. B. Lacy, D. P. Mitchell, and W. M. Schell, "Cryptolib: Cryptography in software," In USENIX Security Symposium IV Proceedings, USENIX Association, pp.1-17, 1993.
- G.. B. Agnew, "Ransom sources for cryptographic systems, "Eurocrypt '87, Springer-Verlag, LNCS v.304, pp.77-81, 1988.
- D. Davis, R. Ihaka, and P. Fenstermacher, "Cryptographic randomness from air turbulence in disk drives," Crypto '94, Springer-Verlag, LNCS v.839, pp.114-120, 1994.
- M. Jakobsson, E. Shriver, B. K. Hillyer, and A. Juels, "A practical secure Random bit generator," ACM Conference on Computer and Communications Security, pp.103-111, 1998.
- J. Hastad, "Pseudo random number generators under uniform assumptions," In Proceeding of the Twenty Second Annual ACM Symposium on Theory of Computing, pp.395-404, 1990.
- M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, New Jersey, 1996.
- FIPS 186, "Digital signature standard," Federal Information Processing Standards 186, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, 1994.
- A. Shacur, "Or the generation of cryptographically strong pseudorandom sequences" ACM Transactions on Computer Science, pp 38-44, 1983.
- L. Blum, M. Blum, and M. shub, "A simple unpredictable pseudo random generator," SIAM Journal on Computing, 15, pp.364-383, 1986. https://doi.org/10.1137/0215025
- S. Micali and C. P. Schnorr, "Efficient perfect polynomial random number generators," Journal of Cryptology, 3, pp.157-172, 1991.
- L. Hong, Y. Wan and A. K. Jain, "Fingerprint enhancement: algorithm and performance evaluation," IEEE Trans. Pattern Anal. Mach. Intell. 20, p777, 1998. https://doi.org/10.1109/34.709565
- D. Mario and D. Maltoni, "Direct Gray-Scale Minutie Detection In Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 19, no.1, pp.27-40, 1997. https://doi.org/10.1109/34.566808
- NIST special prosecution 800-12. A statistical test suite for random and pseudorandom number generators for cryptographic applications. 2000
- M. R. Verma., A.K. Maynrklay, and B coatterjcee, "Edge ceteoction in fingerprints." Pattern Recogmitiom.20.p513, 1987 https://doi.org/10.1016/0031-3203(87)90078-1
- D. M. Weher "A cost effective fingerprint verification algorithm for commercial application." Proceedings of the south African Syraposuno on Commendation and Signal Processing, p.9, 1992.