Cryptography Reference
In-Depth Information
29. Rogaway, “On the Role of Definitions In and Beyond Cryptography,” 27.
30. Silvio Micali and Leonid Reyzin, “Physically Observable Cryptography,” in
Theory of Cryptography: Proceedings of Theory of Cryptography, TCC 2004 , ed. Moni
Naor (Berlin: Springer, 2004), 278.
31. Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum, “One-Time Pro-
grams,” in Advances in Cryptology—CRYPTO 2008 , ed. David Wagner (Berlin: Springer
2008), 40. The physical security model was more or less anticipated by Ross Ander-
son see Ross J. Anderson and Markus Kuhn, “Tamper Resistance: A Cautionary
Note,” in Second USENIX Workshop on Electronic Commerce Proceedings , Oakland, CA,
November 18-20, 1996.
32. Francois-Xavier Standaert et al., “Leakage Resilient Cryptography in Practice,”
in Towards Hardware-Intrinsic Security , ed. Ahmad-Reza Sadeghi and David Naccache
(Berlin: Springer, 2010), 99.
33. François-Xavier Standaert, Tal G. Malkin, and Moti Yung, “A Unified Framework
for the Analysis of Side-Channel Key Recovery Attacks,” Cryptology ePrint Archive,
Report 2006/139, 2, available at http://eprint.iacr.org/2006/139 (accessed June 24,
2011).
34. Like signatures, passwords straddle the frontier between secrets and biometrics,
as they are often chosen in relation to some intimate aspects of one's life stereo-
typically, spouses' names and birthdates.
35. Julie Thorpe and Paul C. van Oorschot, “Graphical Dictionaries and the Memo-
rable Space of Graphical Passwords,” in Proceedings of the 13th Conference on USENIX
Security Symposium (Berkeley: USENIX Association, 2004), 10.
36. Jianxin Yan, Alan Blackwell, Ross J. Anderson, and Alasdair Grant, The Memora-
bility and Security of Passwords: Some Empirical Results (University of Cambridge
Computer Laboratory, September 2000).
37. Smith, Authentication , 157, 160-162.
38. Ian Jermyn et al., “The Design and Analysis of Graphical Passwords,” in Proceed-
ings of the 8th Conference on USENIX Security Symposium (Berkeley: USENIX Associa-
tion, 1999), 1.
39. Fabien Monrose and Michael K Reiter, “Graphical Passwords,” in Security and
Usability: Designing Secure Systems That People Can Use , ed. Lorrie Faith Cranor and
Simson Garfinkel (Sebastopol, CA: O'Reilly Media, 2005), 159.
40. Jermyn et al., “The Design and Analysis of Graphical Passwords.”
41. Ibid.
42. Ibid.
Search WWH ::




Custom Search