Introduction - If you have any usage issues, please Google them yourself
We provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular,reliably and securely authenticating biometric data.