, Biodefense in the Age of Synthetic Biology. National Academies of Sciences, Engineering and Medicine, 2018.
, , 2019.
An Identity-Based Signature from Gap Diffie-Hellman Groups, Public Key Cryptography -PKC 2003, pp.18-30, 2002. ,
A Technique for Computer Detection and Correction of Spelling Errors, Communications of ACM, vol.7, issue.3, pp.171-176, 1964. ,
jPBC: Java Pairing Based Cryptography, Proceedings of the 16th IEEE Symposium on Computers and Communications, pp.850-855, 2011. ,
Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome, Science, vol.329, issue.5987, pp.52-56, 2010. ,
DNA-based Watermarks Using the DNA-Crypt Algorithm, BMC Bioinformatics, vol.8, issue.1, 2007. ,
Design and Synthesis of a Minimal Bacterial Genome, Science, vol.351, issue.6280, 2016. ,
Distribution de la Flore Alpine dans le Bassin des Dranses et dans quelques régions voisines, Sciences Naturelles, vol.37, issue.140, pp.241-72, 1901. ,
Etude De La Distribution Florale Dans Une Portion Des Alpes Et Du Jura, Sciences Naturelles, vol.37, issue.142, pp.547-579, 1901. ,
, Advances in Record-Linkage Methodology as Applied to Matching the 1985 Census of, vol.84, pp.414-420, 1989.
DNA Watermarking of Infectious Agents: progress and Prospects, PLOS Pathogens, vol.6, issue.6, pp.1-3, 2010. ,
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules, Proceedings of the New Security Paradigms Workshop, vol.18, pp.110-122, 2018. ,
, Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet physics doklady, vol.10, pp.707-710, 1966.
Embedding Permanent Watermarks in Synthetic Genes, PLOS ONE, vol.7, issue.8, pp.1-10, 2012. ,
Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More, Proc. of the 26th USENIX Security Symposium, 2017. ,
ID-based Signatures from Pairings on Elliptic Curves, Electronics Letters, vol.38, issue.18, pp.1025-1026, 2002. ,
A Tutorial on Reed-Solomon Coding for Fault-tolerance in RAID-like Systems, Software Practice and Experience, vol.27, issue.9, pp.995-1012, 1997. ,
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960. ,
Design of a Synthetic Yeast Genome, Science, vol.355, issue.6329, pp.1040-1044, 2017. ,
Cryptosystems Based on Pairing, Proceedings of the 2000 Symposium on Cryptography and Information Security, 2000. ,
, ID based Cryptosystems with Pairing on Elliptic Curve. IACR Cryptology ePrint Archive, 2003.
Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology, pp.47-53, 1984. ,
An Identity-based Signature Scheme from the Weil Pairing, IEEE Communications Letters, vol.7, issue.2, pp.76-78, 2003. ,