, Biodefense in the Age of Synthetic Biology. National Academies of Sciences, Engineering and Medicine, 2018.

. Damerau--levenshtein-distance and . Wikipedia, , 2019.

J. C. Choon and J. Hee-cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, Public Key Cryptography -PKC 2003, pp.18-30, 2002.

F. J. Damerau, A Technique for Computer Detection and Correction of Spelling Errors, Communications of ACM, vol.7, issue.3, pp.171-176, 1964.

D. Caro, A. Iovino, and V. , jPBC: Java Pairing Based Cryptography, Proceedings of the 16th IEEE Symposium on Computers and Communications, pp.850-855, 2011.

D. G. Gibson, J. I. Glass, C. Lartigue, V. N. Noskov, R. Y. Chuang et al., Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome, Science, vol.329, issue.5987, pp.52-56, 2010.

D. Heider and A. Barnekow, DNA-based Watermarks Using the DNA-Crypt Algorithm, BMC Bioinformatics, vol.8, issue.1, 2007.

C. A. Hutchison, R. Y. Chuang, V. N. Noskov, N. Assad-garcia, T. J. Deerinck et al., Design and Synthesis of a Minimal Bacterial Genome, Science, vol.351, issue.6280, 2016.

P. Jaccard, Distribution de la Flore Alpine dans le Bassin des Dranses et dans quelques régions voisines, Sciences Naturelles, vol.37, issue.140, pp.241-72, 1901.

P. Jaccard, Etude De La Distribution Florale Dans Une Portion Des Alpes Et Du Jura, Sciences Naturelles, vol.37, issue.142, pp.547-579, 1901.

M. A. Jaro, Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of, vol.84, pp.414-420, 1989.

D. C. Jupiter, T. A. Ficht, J. Samuel, Q. M. Qin, and P. De-figueiredo, DNA Watermarking of Infectious Agents: progress and Prospects, PLOS Pathogens, vol.6, issue.6, pp.1-3, 2010.

D. M. Kar, I. Ray, J. Gallegos, and J. Peccoud, Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules, Proceedings of the New Security Paradigms Workshop, vol.18, pp.110-122, 2018.

V. I. Levenshtein, Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet physics doklady, vol.10, pp.707-710, 1966.

M. Liss, D. Daubert, K. Brunner, K. Kliche, U. Hammes et al., Embedding Permanent Watermarks in Synthetic Genes, PLOS ONE, vol.7, issue.8, pp.1-10, 2012.

P. Ney, K. Koscher, L. Organick, L. Ceze, and T. Kohno, Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More, Proc. of the 26th USENIX Security Symposium, 2017.

K. G. Paterson, ID-based Signatures from Pairings on Elliptic Curves, Electronics Letters, vol.38, issue.18, pp.1025-1026, 2002.

J. S. Plank, A Tutorial on Reed-Solomon Coding for Fault-tolerance in RAID-like Systems, Software Practice and Experience, vol.27, issue.9, pp.995-1012, 1997.

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.

S. M. Richardson, L. A. Mitchell, G. Stracquadanio, K. Yang, J. S. Dymond et al., Design of a Synthetic Yeast Genome, Science, vol.355, issue.6329, pp.1040-1044, 2017.

R. Sakai, K. Ohgishi, and M. Kasahara, Cryptosystems Based on Pairing, Proceedings of the 2000 Symposium on Cryptography and Information Security, 2000.

R. Sakai and M. Kasahara, ID based Cryptosystems with Pairing on Elliptic Curve. IACR Cryptology ePrint Archive, 2003.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology, pp.47-53, 1984.

X. Yi, An Identity-based Signature Scheme from the Weil Pairing, IEEE Communications Letters, vol.7, issue.2, pp.76-78, 2003.