Cryptography Reference
In-Depth Information
29. Rogaway, “On the Role of Definitions In and Beyond Cryptography,” 27.
30. Silvio Micali and Leonid Reyzin, “Physically Observable Cryptography,” in
Theory of Cryptography:
Proceedings of Theory of Cryptography, TCC 2004
, ed. Moni
Naor (Berlin: Springer, 2004), 278.
31. Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum, “One-Time Pro-
grams,” in
Advances in Cryptology—CRYPTO 2008
, ed. David Wagner (Berlin: Springer
2008), 40. The physical security model was more or less anticipated by Ross Ander-
son
—
see Ross J. Anderson and Markus Kuhn, “Tamper Resistance: A Cautionary
Note,” in
Second USENIX Workshop on Electronic Commerce Proceedings
, Oakland, CA,
November 18-20, 1996.
32. Francois-Xavier Standaert et al., “Leakage Resilient Cryptography in Practice,”
in
Towards Hardware-Intrinsic Security
, ed. Ahmad-Reza Sadeghi and David Naccache
(Berlin: Springer, 2010), 99.
33. François-Xavier Standaert, Tal G. Malkin, and Moti Yung, “A Unified Framework
for the Analysis of Side-Channel Key Recovery Attacks,” Cryptology ePrint Archive,
Report 2006/139, 2, available at http://eprint.iacr.org/2006/139 (accessed June 24,
2011).
34. Like signatures, passwords straddle the frontier between secrets and biometrics,
as they are often chosen in relation to some intimate aspects of one's life
—
stereo-
typically, spouses' names and birthdates.
35. Julie Thorpe and Paul C. van Oorschot, “Graphical Dictionaries and the Memo-
rable Space of Graphical Passwords,” in
Proceedings of the 13th Conference on USENIX
Security Symposium
(Berkeley: USENIX Association, 2004), 10.
36. Jianxin Yan, Alan Blackwell, Ross J. Anderson, and Alasdair Grant,
The Memora-
bility and Security of Passwords: Some Empirical Results
(University of Cambridge
Computer Laboratory, September 2000).
37. Smith,
Authentication
, 157, 160-162.
38. Ian Jermyn et al., “The Design and Analysis of Graphical Passwords,” in
Proceed-
ings of the 8th Conference on USENIX Security Symposium
(Berkeley: USENIX Associa-
tion, 1999), 1.
39. Fabien Monrose and Michael K Reiter, “Graphical Passwords,” in
Security and
Usability: Designing Secure Systems That People Can Use
, ed. Lorrie Faith Cranor and
Simson Garfinkel (Sebastopol, CA: O'Reilly Media, 2005), 159.
40. Jermyn et al., “The Design and Analysis of Graphical Passwords.”
41. Ibid.
42. Ibid.