Code offset in the exponent L Demarest, B Fuller, A Russell Cryptology ePrint Archive, 2018 | 8* | 2018 |
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric C Cachet, S Ahmad, L Demarest, S Riback, A Hamlin, B Fuller Information and Computation 293, 105059, 2023 | 4 | 2023 |
Proximity searchable encryption for the iris biometric C Cachet, S Ahmad, L Demarest, A Hamlin, B Fuller Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 3* | 2022 |
FiveEyes: Cryptographic Biometric Authentication from the Iris L Demarest, S Ahmad, S Chen, B Fuller, A Russell Cryptology ePrint Archive, 2024 | | 2024 |
Private Eyes: Zero-Leakage Iris Searchable Encryption J Ha, C Cachet, L Demarest, S Ahmad, B Fuller Cryptology ePrint Archive, 2023 | | 2023 |
Impossibility of Efficient Information-Theoretic Fuzzy Extraction. L Demarest, B Fuller, A Russell IACR Cryptol. ePrint Arch. 2023, 172, 2023 | | 2023 |