Voir la notice de l'article provenant de la source Math-Net.Ru
[1] X. Boyen, “Reusable fuzzy extractors”, Proc. 11th ACM Conf. Computer and communic. security, CCS'04, 82–91
[2] Y. Dodis, L. Reyzin, A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data”, Lect. Notes Comput. Sci., 3072, 2004, 523–540 | DOI | MR
[3] GOST R 52633.0-2006. Information protection. Information protection technology. Requirements to the means of high-reliability biometric authentication, Standardinform, M., 2007, 24 pp. (in Russian)
[4] GOST R 52633.5-2011. Information protection. Information protection technology. The neural net biometry-code convertor automatic training, Standardinform, M., 2012, 20 pp. (in Russian)
[5] GOST R 34.11-2012. Information technology. Cryptographic data security. Hash function, Standardinform, M., 2013, 24 pp. (in Russian)
[6] O. V. Efimov, V. A. Funtikov, Y. K. Jazov, “The neuronet converter “biometry-code” structure and interconnections choice strategy”, Neurocomputers: development, application, 2009, no. 6, 14–16 (in Russian)
[7] T. Kevenaar, B. Skoric, P. Tuyls, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer Science and Business Media, Heidelberg etc., 2007, 340 pp.
[8] G. B. Marshalko, “On the security of a neural network-based biometric authentication scheme”, Matematicheskie voprosi kriptografii, 5:2 (2014), 87–98 | DOI | MR
[9] G. B. Marshalko, V. O. Mironkin, “Geometric analysis of a neural symmetric cipher”, Information Security Problems. Computer Systems, 2017, no. 1, 43–49 (in Russian)
[10] I. G. Nazarov, O. V. Efimov, Y. K. Yazov, “The package of national standards, ensuring biometric and neural network protection of mass circulated personal data privacy”, Neurocomputers: development, application, 2012, no. 3, 9–17 (in Russian)
[11] V. N. Sachkov, Probabilistic methods in combinatorial analysis, Nauka, M., 1978, 288 pp. (in Russian) | MR
[12] Technical specification (project). Neural network container protection using cryptographic algorithms, 2018, 11 pp. (in Russian) https://tc26.ru/discussions/tekhnicheskaya-spetsifikatsiya-zashchita-neyrosetevykh-biometricheskikh-konteynerov-s-ispolzovaniem-.html