Tanya I,Frans M J W.Information Leakage in Fuzzy Commitment Schemes [J].IEEE Transactions on Information Forensics and Security,2010,5(2):337-348.
[9]
Emile J C K,Jeroen B,Tom A M K,Ileana B,and Raymond N J V.Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme [J].IEEE Transactions on Information Forensics and Security,2011,6(1):107-121.
[10]
肖芳英,陈汉武,刘志昊,李志强,刘文杰.有限域上非本原BCH码的对偶包含判定[J].电子学报,2010,38(8):1858-1861. Xiao Fang-ying,Chen Han-wu,Liu Zhi-hao,Li Zhi-qiang,Liu Wen-jie.Dual-containing determination method for non-primitive BCH codes over finite field [J].Acta Electronica Sinica,2010,38(8):1858-1861.(in Chinese)
[11]
Brun T,Devetak I,and Hsieh M H.Catalytic quantum error correction.[DB/OL].[2011-2-20].http://arxiv.org /abs/0608027v2.
[12]
Devetak I,Brun T,and Hsieh M H.Entanglement-assisted quantum error-correcting codes. New Trends Mathematical Physics.Heidelberg:Springer Science + Business Media Press,2009.161-172.