thesis.bbl (53299B)
1 % $ biblatex auxiliary file $ 2 % $ biblatex bbl format version 3.1 $ 3 % Do not modify the above lines! 4 % 5 % This is an auxiliary file used by the 'biblatex' package. 6 % This file may safely be deleted. It will be recreated by 7 % biber as required. 8 % 9 \begingroup 10 \makeatletter 11 \@ifundefined{ver@biblatex.sty} 12 {\@latex@error 13 {Missing 'biblatex' package} 14 {The bibliography requires the 'biblatex' package.} 15 \aftergroup\endinput} 16 {} 17 \endgroup 18 19 20 \refsection{0} 21 \datalist[entry]{none/global//global/global} 22 \entry{jerome2015}{article}{} 23 \name{author}{4}{}{% 24 {{hash=e042fd1cbe6bde0a3c8d7e8074ded97f}{% 25 family={Jérôme}, 26 familyi={J\bibinitperiod}, 27 given={Brugger}, 28 giveni={B\bibinitperiod}}}% 29 {{hash=4b13ebea2e8187b9e7ee5a28ece70bf7}{% 30 family={Angelina}, 31 familyi={A\bibinitperiod}, 32 given={BFH\bibnamedelima Dungga}, 33 giveni={B\bibinitperiod\bibinitdelim D\bibinitperiod}}}% 34 {{hash=7dc3b7da04ebf4e193781c6ca4441dd1}{% 35 family={Esther}, 36 familyi={E\bibinitperiod}, 37 given={BFH\bibnamedelima Hefti}, 38 giveni={B\bibinitperiod\bibinitdelim H\bibinitperiod}}}% 39 {{hash=f4116824e8f06450be45803d598ab7d1}{% 40 family={ZH}, 41 familyi={Z\bibinitperiod}, 42 given={Kt}, 43 giveni={K\bibinitperiod}}}% 44 } 45 \list{organization}{1}{% 46 {BFH}% 47 } 48 \strng{namehash}{7c1cd3857fa434fc3f5603bf8f77898f} 49 \strng{fullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082} 50 \strng{bibnamehash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082} 51 \strng{authorbibnamehash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082} 52 \strng{authornamehash}{7c1cd3857fa434fc3f5603bf8f77898f} 53 \strng{authorfullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082} 54 \field{sortinit}{1} 55 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 56 \field{labelnamesource}{author} 57 \field{labeltitlesource}{title} 58 \field{title}{AHV-Nummer als einheitlicher, organisationsübergreifender Personenidentifikator} 59 \field{year}{2015} 60 \endentry 61 \entry{garfinkel1995}{book}{} 62 \name{author}{1}{}{% 63 {{hash=f7ae1c1e91c1c29835e2ff7e98908fa7}{% 64 family={Garfinkel}, 65 familyi={G\bibinitperiod}, 66 given={Simson}, 67 giveni={S\bibinitperiod}}}% 68 } 69 \list{publisher}{1}{% 70 {" O'Reilly Media, Inc."}% 71 } 72 \strng{namehash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 73 \strng{fullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 74 \strng{bibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 75 \strng{authorbibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 76 \strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 77 \strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7} 78 \field{sortinit}{2} 79 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 80 \field{labelnamesource}{author} 81 \field{labeltitlesource}{title} 82 \field{title}{PGP: pretty good privacy} 83 \field{year}{1995} 84 \endentry 85 \entry{pepdoc}{online}{} 86 \list{organization}{1}{% 87 {pEp Security SA}% 88 } 89 \field{sortinit}{3} 90 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 91 \field{labeltitlesource}{title} 92 \field{title}{Welcome to p≡p Documentation!} 93 \field{urlday}{6} 94 \field{urlmonth}{6} 95 \field{urlyear}{2020} 96 \field{year}{2020} 97 \field{urldateera}{ce} 98 \verb{urlraw} 99 \verb https://www.pep.security/docs/ 100 \endverb 101 \verb{url} 102 \verb https://www.pep.security/docs/ 103 \endverb 104 \endentry 105 \entry{caronni2000}{inproceedings}{} 106 \name{author}{1}{}{% 107 {{hash=881bf2fe8d7563c67a7bf0dca669ec1e}{% 108 family={Caronni}, 109 familyi={C\bibinitperiod}, 110 given={Germano}, 111 giveni={G\bibinitperiod}}}% 112 } 113 \list{organization}{1}{% 114 {IEEE}% 115 } 116 \strng{namehash}{881bf2fe8d7563c67a7bf0dca669ec1e} 117 \strng{fullhash}{881bf2fe8d7563c67a7bf0dca669ec1e} 118 \strng{bibnamehash}{881bf2fe8d7563c67a7bf0dca669ec1e} 119 \strng{authorbibnamehash}{881bf2fe8d7563c67a7bf0dca669ec1e} 120 \strng{authornamehash}{881bf2fe8d7563c67a7bf0dca669ec1e} 121 \strng{authorfullhash}{881bf2fe8d7563c67a7bf0dca669ec1e} 122 \field{sortinit}{4} 123 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 124 \field{labelnamesource}{author} 125 \field{labeltitlesource}{title} 126 \field{booktitle}{Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)} 127 \field{title}{Walking the web of trust} 128 \field{year}{2000} 129 \field{pages}{153\bibrangedash 158} 130 \range{pages}{6} 131 \endentry 132 \entry{LLLW*2017}{inproceedings}{} 133 \name{author}{7}{}{% 134 {{hash=c4d8c39e3a63acab6d94c490b6d45028}{% 135 family={Liu}, 136 familyi={L\bibinitperiod}, 137 given={Yi}, 138 giveni={Y\bibinitperiod}}}% 139 {{hash=3e1f0e5c79944a684b0e981db2d979bf}{% 140 family={Li}, 141 familyi={L\bibinitperiod}, 142 given={Ruilin}, 143 giveni={R\bibinitperiod}}}% 144 {{hash=ded616c8fbaf16eea249759846a9c40f}{% 145 family={Liu}, 146 familyi={L\bibinitperiod}, 147 given={Xingtong}, 148 giveni={X\bibinitperiod}}}% 149 {{hash=c33641e67eeaefc87b7821dc9b51ff90}{% 150 family={Wang}, 151 familyi={W\bibinitperiod}, 152 given={Jian}, 153 giveni={J\bibinitperiod}}}% 154 {{hash=f4a4cbf770add19c206827116c68732e}{% 155 family={Zhang}, 156 familyi={Z\bibinitperiod}, 157 given={Lei}, 158 giveni={L\bibinitperiod}}}% 159 {{hash=6b995a03f55b8c0d7a4ed8e44daae0a5}{% 160 family={Tang}, 161 familyi={T\bibinitperiod}, 162 given={Chaojing}, 163 giveni={C\bibinitperiod}}}% 164 {{hash=ba23fbcd4b04b46c4588892f422fe72b}{% 165 family={Kang}, 166 familyi={K\bibinitperiod}, 167 given={Hongyan}, 168 giveni={H\bibinitperiod}}}% 169 } 170 \list{organization}{1}{% 171 {IEEE}% 172 } 173 \strng{namehash}{10c7b94477775db573510e04e477a77b} 174 \strng{fullhash}{40a5ec0e4490a4063bf48a5924ef1c0f} 175 \strng{bibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f} 176 \strng{authorbibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f} 177 \strng{authornamehash}{10c7b94477775db573510e04e477a77b} 178 \strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f} 179 \field{sortinit}{5} 180 \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} 181 \field{labelnamesource}{author} 182 \field{labeltitlesource}{title} 183 \field{booktitle}{2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)} 184 \field{title}{An efficient method to enhance Bitcoin wallet security} 185 \field{year}{2017} 186 \field{pages}{26\bibrangedash 29} 187 \range{pages}{4} 188 \endentry 189 \entry{millions_lost}{online}{} 190 \name{author}{1}{}{% 191 {{hash=3648296958ad2ea0461fac7a13e12981}{% 192 family={Cuthbertson}, 193 familyi={C\bibinitperiod}, 194 given={Anthony}, 195 giveni={A\bibinitperiod}}}% 196 } 197 \list{organization}{1}{% 198 {INDEPENDENT}% 199 } 200 \strng{namehash}{3648296958ad2ea0461fac7a13e12981} 201 \strng{fullhash}{3648296958ad2ea0461fac7a13e12981} 202 \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981} 203 \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981} 204 \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981} 205 \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981} 206 \field{sortinit}{6} 207 \field{sortinithash}{b33bc299efb3c36abec520a4c896a66d} 208 \field{labelnamesource}{author} 209 \field{labeltitlesource}{title} 210 \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password} 211 \field{urlday}{7} 212 \field{urlmonth}{3} 213 \field{urlyear}{2020} 214 \field{year}{2019} 215 \field{urldateera}{ce} 216 \verb{urlraw} 217 \verb https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html 218 \endverb 219 \verb{url} 220 \verb https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html 221 \endverb 222 \endentry 223 \entry{bitcoin-keys}{online}{} 224 \list{organization}{1}{% 225 {Bitcoin}% 226 } 227 \field{sortinit}{7} 228 \field{sortinithash}{108d0be1b1bee9773a1173443802c0a3} 229 \field{labeltitlesource}{title} 230 \field{title}{BIP 32 - Hierarchical Deterministic Wallets} 231 \field{urlday}{6} 232 \field{urlmonth}{6} 233 \field{urlyear}{2020} 234 \field{year}{2020} 235 \field{urldateera}{ce} 236 \verb{urlraw} 237 \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png 238 \endverb 239 \verb{url} 240 \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png 241 \endverb 242 \endentry 243 \entry{bajikar2002}{article}{} 244 \name{author}{1}{}{% 245 {{hash=b5c45c4b8deb48651c65650f0409e671}{% 246 family={Bajikar}, 247 familyi={B\bibinitperiod}, 248 given={Sundeep}, 249 giveni={S\bibinitperiod}}}% 250 } 251 \strng{namehash}{b5c45c4b8deb48651c65650f0409e671} 252 \strng{fullhash}{b5c45c4b8deb48651c65650f0409e671} 253 \strng{bibnamehash}{b5c45c4b8deb48651c65650f0409e671} 254 \strng{authorbibnamehash}{b5c45c4b8deb48651c65650f0409e671} 255 \strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671} 256 \strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671} 257 \field{sortinit}{9} 258 \field{sortinithash}{0a5ebc79d83c96b6579069544c73c7d4} 259 \field{labelnamesource}{author} 260 \field{labeltitlesource}{title} 261 \field{journaltitle}{Mobile Platforms Group Intel Corporation} 262 \field{title}{Trusted platform module (tpm) based security on notebook pcs-white paper} 263 \field{volume}{1} 264 \field{year}{2002} 265 \field{pages}{20} 266 \range{pages}{1} 267 \endentry 268 \entry{vadhan2012}{article}{} 269 \true{moreauthor} 270 \true{morelabelname} 271 \name{author}{1}{}{% 272 {{hash=4a7848d2e829c08c64fd0693e3389940}{% 273 family={Vadhan}, 274 familyi={V\bibinitperiod}, 275 given={Salil\bibnamedelima P}, 276 giveni={S\bibinitperiod\bibinitdelim P\bibinitperiod}}}% 277 } 278 \list{publisher}{1}{% 279 {Now Publishers, Inc.}% 280 } 281 \strng{namehash}{abb7f98446293f740b141f01ff61554d} 282 \strng{fullhash}{abb7f98446293f740b141f01ff61554d} 283 \strng{bibnamehash}{abb7f98446293f740b141f01ff61554d} 284 \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d} 285 \strng{authornamehash}{abb7f98446293f740b141f01ff61554d} 286 \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d} 287 \field{sortinit}{1} 288 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 289 \field{labelnamesource}{author} 290 \field{labeltitlesource}{title} 291 \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer Science} 292 \field{number}{1--3} 293 \field{title}{Pseudorandomness} 294 \field{volume}{7} 295 \field{year}{2012} 296 \field{pages}{1\bibrangedash 336} 297 \range{pages}{336} 298 \endentry 299 \entry{nielsen2002}{inproceedings}{} 300 \name{author}{1}{}{% 301 {{hash=6535189281ff6a1012638e384823f5cf}{% 302 family={Nielsen}, 303 familyi={N\bibinitperiod}, 304 given={Jesper\bibnamedelima Buus}, 305 giveni={J\bibinitperiod\bibinitdelim B\bibinitperiod}}}% 306 } 307 \list{organization}{1}{% 308 {Springer}% 309 } 310 \strng{namehash}{6535189281ff6a1012638e384823f5cf} 311 \strng{fullhash}{6535189281ff6a1012638e384823f5cf} 312 \strng{bibnamehash}{6535189281ff6a1012638e384823f5cf} 313 \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf} 314 \strng{authornamehash}{6535189281ff6a1012638e384823f5cf} 315 \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf} 316 \field{sortinit}{1} 317 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 318 \field{labelnamesource}{author} 319 \field{labeltitlesource}{title} 320 \field{booktitle}{Annual International Cryptology Conference} 321 \field{title}{A threshold pseudorandom function construction and its applications} 322 \field{year}{2002} 323 \field{pages}{401\bibrangedash 416} 324 \range{pages}{16} 325 \endentry 326 \entry{GGM1986}{article}{} 327 \name{author}{3}{}{% 328 {{hash=66aba379c7d3adb8af5b662a65c4c140}{% 329 family={Goldreich}, 330 familyi={G\bibinitperiod}, 331 given={Oded}, 332 giveni={O\bibinitperiod}}}% 333 {{hash=39e4a0690915f1d991133196a545b37b}{% 334 family={Goldwasser}, 335 familyi={G\bibinitperiod}, 336 given={Shafi}, 337 giveni={S\bibinitperiod}}}% 338 {{hash=fb54c363f1b0d126e883c84df49e4790}{% 339 family={Micali}, 340 familyi={M\bibinitperiod}, 341 given={Silvio}, 342 giveni={S\bibinitperiod}}}% 343 } 344 \list{location}{1}{% 345 {New York, NY, USA}% 346 } 347 \list{publisher}{1}{% 348 {Association for Computing Machinery}% 349 } 350 \strng{namehash}{39e304099b960365cdb56b83f4c70df6} 351 \strng{fullhash}{39e304099b960365cdb56b83f4c70df6} 352 \strng{bibnamehash}{39e304099b960365cdb56b83f4c70df6} 353 \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6} 354 \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6} 355 \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6} 356 \field{sortinit}{1} 357 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 358 \field{labelnamesource}{author} 359 \field{labeltitlesource}{title} 360 \field{issn}{0004-5411} 361 \field{journaltitle}{J. ACM} 362 \field{month}{8} 363 \field{number}{4} 364 \field{title}{How to Construct Random Functions} 365 \field{volume}{33} 366 \field{year}{1986} 367 \field{pages}{792\bibrangedash 807} 368 \range{pages}{16} 369 \verb{doi} 370 \verb 10.1145/6490.6503 371 \endverb 372 \verb{urlraw} 373 \verb https://doi.org/10.1145/6490.6503 374 \endverb 375 \verb{url} 376 \verb https://doi.org/10.1145/6490.6503 377 \endverb 378 \endentry 379 \entry{Preneel1999}{inbook}{} 380 \name{author}{1}{}{% 381 {{hash=0b9d4896fca22178c881b5236f351e05}{% 382 family={Preneel}, 383 familyi={P\bibinitperiod}, 384 given={Bart}, 385 giveni={B\bibinitperiod}}}% 386 } 387 \name{editor}{1}{}{% 388 {{hash=14f9bdb855aa40873ff3dce506ed6fff}{% 389 family={Damg{å}rd}, 390 familyi={D\bibinitperiod}, 391 given={Ivan\bibnamedelima Bjerre}, 392 giveni={I\bibinitperiod\bibinitdelim B\bibinitperiod}}}% 393 } 394 \list{location}{1}{% 395 {Berlin, Heidelberg}% 396 } 397 \list{publisher}{1}{% 398 {Springer Berlin Heidelberg}% 399 } 400 \strng{namehash}{0b9d4896fca22178c881b5236f351e05} 401 \strng{fullhash}{0b9d4896fca22178c881b5236f351e05} 402 \strng{bibnamehash}{0b9d4896fca22178c881b5236f351e05} 403 \strng{authorbibnamehash}{0b9d4896fca22178c881b5236f351e05} 404 \strng{authornamehash}{0b9d4896fca22178c881b5236f351e05} 405 \strng{authorfullhash}{0b9d4896fca22178c881b5236f351e05} 406 \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff} 407 \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff} 408 \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff} 409 \field{sortinit}{1} 410 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 411 \field{labelnamesource}{author} 412 \field{labeltitlesource}{title} 413 \field{abstract}{This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.} 414 \field{booktitle}{Lectures on Data Security: Modern Cryptology in Theory and Practice} 415 \field{isbn}{978-3-540-48969-6} 416 \field{title}{The State of Cryptographic Hash Functions} 417 \field{year}{1999} 418 \field{pages}{158} 419 \range{pages}{1} 420 \verb{doi} 421 \verb 10.1007/3-540-48969-X_8 422 \endverb 423 \verb{urlraw} 424 \verb https://doi.org/10.1007/3-540-48969-X_8 425 \endverb 426 \verb{url} 427 \verb https://doi.org/10.1007/3-540-48969-X_8 428 \endverb 429 \endentry 430 \entry{SG2012}{article}{} 431 \name{author}{2}{}{% 432 {{hash=831a194fddb2f27c4e2c482b1f72f48a}{% 433 family={Sobti}, 434 familyi={S\bibinitperiod}, 435 given={Rajeev}, 436 giveni={R\bibinitperiod}}}% 437 {{hash=c244900d83a048c38628604327a28052}{% 438 family={Geetha}, 439 familyi={G\bibinitperiod}, 440 given={G}, 441 giveni={G\bibinitperiod}}}% 442 } 443 \list{publisher}{1}{% 444 {International Journal of Computer Science Issues (IJCSI)}% 445 } 446 \strng{namehash}{4d5e3f9d17e0c0b2294603b963e91c33} 447 \strng{fullhash}{4d5e3f9d17e0c0b2294603b963e91c33} 448 \strng{bibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33} 449 \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33} 450 \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33} 451 \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33} 452 \field{sortinit}{1} 453 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 454 \field{labelnamesource}{author} 455 \field{labeltitlesource}{title} 456 \field{journaltitle}{International Journal of Computer Science Issues (IJCSI)} 457 \field{number}{2} 458 \field{title}{Cryptographic hash functions: a review} 459 \field{volume}{9} 460 \field{year}{2012} 461 \field{pages}{462} 462 \range{pages}{1} 463 \endentry 464 \entry{RK2011}{article}{} 465 \name{author}{2}{}{% 466 {{hash=8f939579bcf2d180bae9f53387cab62b}{% 467 family={Ramanujam}, 468 familyi={R\bibinitperiod}, 469 given={Sriram}, 470 giveni={S\bibinitperiod}}}% 471 {{hash=81584ababc9dfe487baae50ab6f0ca8a}{% 472 family={Karuppiah}, 473 familyi={K\bibinitperiod}, 474 given={Marimuthu}, 475 giveni={M\bibinitperiod}}}% 476 } 477 \strng{namehash}{79ea2c47cb704d13b6d9bcf7c199fc51} 478 \strng{fullhash}{79ea2c47cb704d13b6d9bcf7c199fc51} 479 \strng{bibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51} 480 \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51} 481 \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51} 482 \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51} 483 \field{sortinit}{1} 484 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 485 \field{labelnamesource}{author} 486 \field{labeltitlesource}{title} 487 \field{journaltitle}{IJCSNS International Journal of Computer Science and Network Security} 488 \field{number}{1} 489 \field{title}{Designing an algorithm with high Avalanche Effect} 490 \field{volume}{11} 491 \field{year}{2011} 492 \field{pages}{106\bibrangedash 111} 493 \range{pages}{6} 494 \endentry 495 \entry{GJW2011}{inproceedings}{} 496 \name{author}{3}{}{% 497 {{hash=74ca2f05d1125811a4211361255b1cf2}{% 498 family={Gueron}, 499 familyi={G\bibinitperiod}, 500 given={Shay}, 501 giveni={S\bibinitperiod}}}% 502 {{hash=38e00ab25a60509b785c20ef8caa89b9}{% 503 family={Johnson}, 504 familyi={J\bibinitperiod}, 505 given={Simon}, 506 giveni={S\bibinitperiod}}}% 507 {{hash=20a47eef2fa55e0486b02a0e2a0b8d0c}{% 508 family={Walker}, 509 familyi={W\bibinitperiod}, 510 given={Jesse}, 511 giveni={J\bibinitperiod}}}% 512 } 513 \list{organization}{1}{% 514 {IEEE}% 515 } 516 \strng{namehash}{4b253103893adba3aada17995ac73ec0} 517 \strng{fullhash}{4b253103893adba3aada17995ac73ec0} 518 \strng{bibnamehash}{4b253103893adba3aada17995ac73ec0} 519 \strng{authorbibnamehash}{4b253103893adba3aada17995ac73ec0} 520 \strng{authornamehash}{4b253103893adba3aada17995ac73ec0} 521 \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0} 522 \field{sortinit}{1} 523 \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a} 524 \field{labelnamesource}{author} 525 \field{labeltitlesource}{title} 526 \field{booktitle}{2011 Eighth International Conference on Information Technology: New Generations} 527 \field{title}{SHA-512/256} 528 \field{year}{2011} 529 \field{pages}{354\bibrangedash 358} 530 \range{pages}{5} 531 \endentry 532 \entry{BCK1996}{article}{} 533 \name{author}{3}{}{% 534 {{hash=06e2bb2f83d8b669b46db64431509301}{% 535 family={Bellare}, 536 familyi={B\bibinitperiod}, 537 given={Mihir}, 538 giveni={M\bibinitperiod}}}% 539 {{hash=7faf0f3900af6c70795ea089d283f02e}{% 540 family={Canetti}, 541 familyi={C\bibinitperiod}, 542 given={Ran}, 543 giveni={R\bibinitperiod}}}% 544 {{hash=088445b3855bedf4bcc9d25651eb98b2}{% 545 family={Krawczyk}, 546 familyi={K\bibinitperiod}, 547 given={Hugo}, 548 giveni={H\bibinitperiod}}}% 549 } 550 \strng{namehash}{2527ef0685da3bdb01959cd066adc238} 551 \strng{fullhash}{2527ef0685da3bdb01959cd066adc238} 552 \strng{bibnamehash}{2527ef0685da3bdb01959cd066adc238} 553 \strng{authorbibnamehash}{2527ef0685da3bdb01959cd066adc238} 554 \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238} 555 \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238} 556 \field{sortinit}{2} 557 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 558 \field{labelnamesource}{author} 559 \field{labeltitlesource}{title} 560 \field{journaltitle}{RSA Laboratories’ CryptoBytes} 561 \field{number}{1} 562 \field{title}{Message authentication using hash functions: The HMAC construction} 563 \field{volume}{2} 564 \field{year}{1996} 565 \field{pages}{12\bibrangedash 15} 566 \range{pages}{4} 567 \endentry 568 \entry{krawczyk2010}{inproceedings}{} 569 \name{author}{1}{}{% 570 {{hash=088445b3855bedf4bcc9d25651eb98b2}{% 571 family={Krawczyk}, 572 familyi={K\bibinitperiod}, 573 given={Hugo}, 574 giveni={H\bibinitperiod}}}% 575 } 576 \list{organization}{1}{% 577 {Springer}% 578 } 579 \strng{namehash}{088445b3855bedf4bcc9d25651eb98b2} 580 \strng{fullhash}{088445b3855bedf4bcc9d25651eb98b2} 581 \strng{bibnamehash}{088445b3855bedf4bcc9d25651eb98b2} 582 \strng{authorbibnamehash}{088445b3855bedf4bcc9d25651eb98b2} 583 \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2} 584 \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2} 585 \field{sortinit}{2} 586 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 587 \field{labelnamesource}{author} 588 \field{labeltitlesource}{title} 589 \field{booktitle}{Annual Cryptology Conference} 590 \field{title}{Cryptographic extraction and key derivation: The HKDF scheme} 591 \field{year}{2010} 592 \field{pages}{631\bibrangedash 648} 593 \range{pages}{18} 594 \endentry 595 \entry{trimberger2012}{book}{} 596 \name{author}{1}{}{% 597 {{hash=0afd18d7b25d23c61db1fe942ec1c236}{% 598 family={Trimberger}, 599 familyi={T\bibinitperiod}, 600 given={Stephen\bibnamedelima M}, 601 giveni={S\bibinitperiod\bibinitdelim M\bibinitperiod}}}% 602 } 603 \list{publisher}{1}{% 604 {Springer Science \& Business Media}% 605 } 606 \strng{namehash}{0afd18d7b25d23c61db1fe942ec1c236} 607 \strng{fullhash}{0afd18d7b25d23c61db1fe942ec1c236} 608 \strng{bibnamehash}{0afd18d7b25d23c61db1fe942ec1c236} 609 \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236} 610 \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236} 611 \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236} 612 \field{sortinit}{2} 613 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 614 \field{labelnamesource}{author} 615 \field{labeltitlesource}{title} 616 \field{title}{Field-programmable gate array technology} 617 \field{year}{2012} 618 \endentry 619 \entry{madurawe2006}{misc}{} 620 \name{author}{1}{}{% 621 {{hash=093f14ec763e8df6227fd18ac8958011}{% 622 family={Madurawe}, 623 familyi={M\bibinitperiod}, 624 given={Raminda\bibnamedelima Udaya}, 625 giveni={R\bibinitperiod\bibinitdelim U\bibinitperiod}}}% 626 } 627 \list{publisher}{1}{% 628 {Google Patents}% 629 } 630 \strng{namehash}{093f14ec763e8df6227fd18ac8958011} 631 \strng{fullhash}{093f14ec763e8df6227fd18ac8958011} 632 \strng{bibnamehash}{093f14ec763e8df6227fd18ac8958011} 633 \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011} 634 \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011} 635 \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011} 636 \field{sortinit}{2} 637 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 638 \field{labelnamesource}{author} 639 \field{labeltitlesource}{title} 640 \field{month}{6} 641 \field{note}{US Patent 7,064,579} 642 \field{title}{Alterable application specific integrated circuit (ASIC)} 643 \field{year}{2006} 644 \endentry 645 \entry{BDK2016}{inproceedings}{} 646 \name{author}{3}{}{% 647 {{hash=6b9702c0a225b2966f2e07631bcfe935}{% 648 family={Biryukov}, 649 familyi={B\bibinitperiod}, 650 given={Alex}, 651 giveni={A\bibinitperiod}}}% 652 {{hash=bf937d804c107f19fafa536592af6563}{% 653 family={Dinu}, 654 familyi={D\bibinitperiod}, 655 given={Daniel}, 656 giveni={D\bibinitperiod}}}% 657 {{hash=d38e18b5ec4018e5f12aab4287c4a08f}{% 658 family={Khovratovich}, 659 familyi={K\bibinitperiod}, 660 given={Dmitry}, 661 giveni={D\bibinitperiod}}}% 662 } 663 \list{organization}{1}{% 664 {IEEE}% 665 } 666 \strng{namehash}{037d5c3d4e3ef2dcef34dc59a05beed9} 667 \strng{fullhash}{037d5c3d4e3ef2dcef34dc59a05beed9} 668 \strng{bibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9} 669 \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9} 670 \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9} 671 \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9} 672 \field{sortinit}{2} 673 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 674 \field{labelnamesource}{author} 675 \field{labeltitlesource}{title} 676 \field{booktitle}{2016 IEEE European Symposium on Security and Privacy (EuroS\&P)} 677 \field{title}{Argon2: new generation of memory-hard functions for password hashing and other applications} 678 \field{year}{2016} 679 \field{pages}{292\bibrangedash 302} 680 \range{pages}{11} 681 \endentry 682 \entry{stamp2003}{article}{} 683 \name{author}{1}{}{% 684 {{hash=799c6648cb97b6ffb4e9da11a6e277ac}{% 685 family={Stamp}, 686 familyi={S\bibinitperiod}, 687 given={Mark}, 688 giveni={M\bibinitperiod}}}% 689 } 690 \strng{namehash}{799c6648cb97b6ffb4e9da11a6e277ac} 691 \strng{fullhash}{799c6648cb97b6ffb4e9da11a6e277ac} 692 \strng{bibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac} 693 \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac} 694 \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac} 695 \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac} 696 \field{sortinit}{2} 697 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 698 \field{labelnamesource}{author} 699 \field{labeltitlesource}{title} 700 \field{journaltitle}{San Jose State University, Department of Computer Science} 701 \field{title}{Once upon a time-memory tradeoff} 702 \field{year}{2003} 703 \endentry 704 \entry{shamir_sharing}{article}{} 705 \name{author}{1}{}{% 706 {{hash=71b77dd8ab33fe646ef25cded49e9881}{% 707 family={Shamir}, 708 familyi={S\bibinitperiod}, 709 given={Adi}, 710 giveni={A\bibinitperiod}}}% 711 } 712 \list{publisher}{1}{% 713 {ACm New York, NY, USA}% 714 } 715 \strng{namehash}{71b77dd8ab33fe646ef25cded49e9881} 716 \strng{fullhash}{71b77dd8ab33fe646ef25cded49e9881} 717 \strng{bibnamehash}{71b77dd8ab33fe646ef25cded49e9881} 718 \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881} 719 \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881} 720 \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881} 721 \field{sortinit}{2} 722 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 723 \field{labelnamesource}{author} 724 \field{labeltitlesource}{title} 725 \field{journaltitle}{Communications of the ACM} 726 \field{number}{11} 727 \field{title}{How to share a secret} 728 \field{volume}{22} 729 \field{year}{1979} 730 \field{pages}{612\bibrangedash 613} 731 \range{pages}{2} 732 \endentry 733 \entry{pedersen_sharing_0}{inproceedings}{} 734 \name{author}{1}{}{% 735 {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{% 736 family={Pedersen}, 737 familyi={P\bibinitperiod}, 738 given={Torben\bibnamedelima Pryds}, 739 giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}% 740 } 741 \list{organization}{1}{% 742 {Springer}% 743 } 744 \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b} 745 \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b} 746 \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 747 \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 748 \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 749 \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b} 750 \field{extraname}{1} 751 \field{sortinit}{2} 752 \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a} 753 \field{labelnamesource}{author} 754 \field{labeltitlesource}{title} 755 \field{booktitle}{Annual international cryptology conference} 756 \field{chapter}{0} 757 \field{title}{Non-interactive and information-theoretic secure verifiable secret sharing} 758 \field{year}{1991} 759 \field{pages}{129\bibrangedash 140} 760 \range{pages}{12} 761 \endentry 762 \entry{feldman_sharing}{inproceedings}{} 763 \name{author}{1}{}{% 764 {{hash=618e5892290641345f357d52e5ef3c12}{% 765 family={Feldman}, 766 familyi={F\bibinitperiod}, 767 given={Paul}, 768 giveni={P\bibinitperiod}}}% 769 } 770 \list{organization}{1}{% 771 {IEEE}% 772 } 773 \strng{namehash}{618e5892290641345f357d52e5ef3c12} 774 \strng{fullhash}{618e5892290641345f357d52e5ef3c12} 775 \strng{bibnamehash}{618e5892290641345f357d52e5ef3c12} 776 \strng{authorbibnamehash}{618e5892290641345f357d52e5ef3c12} 777 \strng{authornamehash}{618e5892290641345f357d52e5ef3c12} 778 \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12} 779 \field{sortinit}{3} 780 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 781 \field{labelnamesource}{author} 782 \field{labeltitlesource}{title} 783 \field{booktitle}{28th Annual Symposium on Foundations of Computer Science (sfcs 1987)} 784 \field{title}{A practical scheme for non-interactive verifiable secret sharing} 785 \field{year}{1987} 786 \field{pages}{427\bibrangedash 438} 787 \range{pages}{12} 788 \endentry 789 \entry{pedersen_sharing_5.2}{inproceedings}{} 790 \name{author}{1}{}{% 791 {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{% 792 family={Pedersen}, 793 familyi={P\bibinitperiod}, 794 given={Torben\bibnamedelima Pryds}, 795 giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}% 796 } 797 \list{organization}{1}{% 798 {Springer}% 799 } 800 \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b} 801 \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b} 802 \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 803 \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 804 \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b} 805 \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b} 806 \field{extraname}{2} 807 \field{sortinit}{3} 808 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 809 \field{labelnamesource}{author} 810 \field{labeltitlesource}{title} 811 \field{booktitle}{Annual international cryptology conference} 812 \field{chapter}{5.2} 813 \field{title}{Non-interactive and information-theoretic secure verifiable secret sharing} 814 \field{year}{1991} 815 \field{pages}{129\bibrangedash 140} 816 \range{pages}{12} 817 \endentry 818 \entry{multifactor_authentication}{article}{} 819 \name{author}{6}{}{% 820 {{hash=349f11e1663912dcb58a979614214591}{% 821 family={Ometov}, 822 familyi={O\bibinitperiod}, 823 given={Aleksandr}, 824 giveni={A\bibinitperiod}}}% 825 {{hash=2210a791565f0e229e45ee4adddbe39a}{% 826 family={Bezzateev}, 827 familyi={B\bibinitperiod}, 828 given={Sergey}, 829 giveni={S\bibinitperiod}}}% 830 {{hash=515fcf6ab2738bfda2f35fc8a7aabbad}{% 831 family={Makitalo}, 832 familyi={M\bibinitperiod}, 833 given={Niko}, 834 giveni={N\bibinitperiod}}}% 835 {{hash=29e0c47c24b13223f7986b9dd3f37aeb}{% 836 family={Andreev}, 837 familyi={A\bibinitperiod}, 838 given={Sergey}, 839 giveni={S\bibinitperiod}}}% 840 {{hash=5d7740b6e2ec0fb41f72f451e980670b}{% 841 family={Mikkonen}, 842 familyi={M\bibinitperiod}, 843 given={Tommi}, 844 giveni={T\bibinitperiod}}}% 845 {{hash=1b1c95790f3403d472ac8a4befa0eb49}{% 846 family={Koucheryavy}, 847 familyi={K\bibinitperiod}, 848 given={Yevgeni}, 849 giveni={Y\bibinitperiod}}}% 850 } 851 \list{publisher}{1}{% 852 {Multidisciplinary Digital Publishing Institute}% 853 } 854 \strng{namehash}{45cd1a76e0cdd8946f91bead3b664768} 855 \strng{fullhash}{c1db872bc8ef36ee51e0526f23769166} 856 \strng{bibnamehash}{c1db872bc8ef36ee51e0526f23769166} 857 \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166} 858 \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768} 859 \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166} 860 \field{sortinit}{3} 861 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 862 \field{labelnamesource}{author} 863 \field{labeltitlesource}{title} 864 \field{journaltitle}{Cryptography} 865 \field{number}{1} 866 \field{title}{Multi-factor authentication: A survey} 867 \field{volume}{2} 868 \field{year}{2018} 869 \field{pages}{1} 870 \range{pages}{1} 871 \endentry 872 \entry{authentication_methods_review}{article}{} 873 \name{author}{4}{}{% 874 {{hash=7320eb44b90aead6870ac2fab7d71076}{% 875 family={Syed\bibnamedelima Idrus}, 876 familyi={S\bibinitperiod\bibinitdelim I\bibinitperiod}, 877 given={Syed\bibnamedelima Zulkarnain}, 878 giveni={S\bibinitperiod\bibinitdelim Z\bibinitperiod}}}% 879 {{hash=a09a932af5f7cd55229eaae3115944ad}{% 880 family={Cherrier}, 881 familyi={C\bibinitperiod}, 882 given={Estelle}, 883 giveni={E\bibinitperiod}}}% 884 {{hash=b91ea03eff7b52d366d5afa7847a6284}{% 885 family={Rosenberger}, 886 familyi={R\bibinitperiod}, 887 given={Christophe}, 888 giveni={C\bibinitperiod}}}% 889 {{hash=315979ea9ce5ac9865a4cf0dae673cd0}{% 890 family={Schwartzmann}, 891 familyi={S\bibinitperiod}, 892 given={Jean-Jacques}, 893 giveni={J\bibinithyphendelim J\bibinitperiod}}}% 894 } 895 \strng{namehash}{ce7e837cc1dbca8dddef9896de46176c} 896 \strng{fullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3} 897 \strng{bibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3} 898 \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3} 899 \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c} 900 \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3} 901 \field{sortinit}{3} 902 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 903 \field{labelnamesource}{author} 904 \field{labeltitlesource}{title} 905 \field{journaltitle}{Australian Journal of Basic and Applied Sciences} 906 \field{number}{5} 907 \field{title}{A Review on Authentication Methods} 908 \field{volume}{7} 909 \field{year}{2013} 910 \field{pages}{95\bibrangedash 107} 911 \range{pages}{13} 912 \verb{urlraw} 913 \verb https://hal.archives-ouvertes.fr/hal-00912435 914 \endverb 915 \verb{url} 916 \verb https://hal.archives-ouvertes.fr/hal-00912435 917 \endverb 918 \endentry 919 \entry{just2004}{article}{} 920 \name{author}{1}{}{% 921 {{hash=daa648a2c605762c09bfaab94d0f2168}{% 922 family={Just}, 923 familyi={J\bibinitperiod}, 924 given={Mike}, 925 giveni={M\bibinitperiod}}}% 926 } 927 \list{publisher}{1}{% 928 {IEEE}% 929 } 930 \strng{namehash}{daa648a2c605762c09bfaab94d0f2168} 931 \strng{fullhash}{daa648a2c605762c09bfaab94d0f2168} 932 \strng{bibnamehash}{daa648a2c605762c09bfaab94d0f2168} 933 \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168} 934 \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168} 935 \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168} 936 \field{sortinit}{3} 937 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 938 \field{labelnamesource}{author} 939 \field{labeltitlesource}{title} 940 \field{journaltitle}{IEEE Security \& Privacy} 941 \field{number}{5} 942 \field{title}{Designing and evaluating challenge-question systems} 943 \field{volume}{2} 944 \field{year}{2004} 945 \field{pages}{32\bibrangedash 39} 946 \range{pages}{8} 947 \endentry 948 \entry{MBSS2013}{inproceedings}{} 949 \name{author}{4}{}{% 950 {{hash=0c05d559d041112c87e63b05c5a7262b}{% 951 family={Mulliner}, 952 familyi={M\bibinitperiod}, 953 given={Collin}, 954 giveni={C\bibinitperiod}}}% 955 {{hash=4e0292e00a4787b4db10b2dff39f4a1f}{% 956 family={Borgaonkar}, 957 familyi={B\bibinitperiod}, 958 given={Ravishankar}, 959 giveni={R\bibinitperiod}}}% 960 {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{% 961 family={Stewin}, 962 familyi={S\bibinitperiod}, 963 given={Patrick}, 964 giveni={P\bibinitperiod}}}% 965 {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{% 966 family={Seifert}, 967 familyi={S\bibinitperiod}, 968 given={Jean-Pierre}, 969 giveni={J\bibinithyphendelim P\bibinitperiod}}}% 970 } 971 \list{organization}{1}{% 972 {Springer}% 973 } 974 \strng{namehash}{adce78e3f1e04476f35b2b5fcb6c6262} 975 \strng{fullhash}{85e8ef541ae3f71805b7382856006c85} 976 \strng{bibnamehash}{85e8ef541ae3f71805b7382856006c85} 977 \strng{authorbibnamehash}{85e8ef541ae3f71805b7382856006c85} 978 \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262} 979 \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85} 980 \field{sortinit}{3} 981 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 982 \field{labelnamesource}{author} 983 \field{labeltitlesource}{title} 984 \field{booktitle}{International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment} 985 \field{title}{SMS-based one-time passwords: attacks and defense} 986 \field{year}{2013} 987 \field{pages}{150\bibrangedash 159} 988 \range{pages}{10} 989 \endentry 990 \entry{rieck_detection}{book}{} 991 \name{author}{3}{}{% 992 {{hash=47449209bde605e33642aeb4dcc23bf2}{% 993 family={Rieck}, 994 familyi={R\bibinitperiod}, 995 given={Konrad}, 996 giveni={K\bibinitperiod}}}% 997 {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{% 998 family={Stewin}, 999 familyi={S\bibinitperiod}, 1000 given={Patrick}, 1001 giveni={P\bibinitperiod}}}% 1002 {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{% 1003 family={Seifert}, 1004 familyi={S\bibinitperiod}, 1005 given={Jean-Pierre}, 1006 giveni={J\bibinithyphendelim P\bibinitperiod}}}% 1007 } 1008 \list{publisher}{1}{% 1009 {Springer}% 1010 } 1011 \strng{namehash}{5646590031d49807385b96f9f6caae4a} 1012 \strng{fullhash}{5646590031d49807385b96f9f6caae4a} 1013 \strng{bibnamehash}{5646590031d49807385b96f9f6caae4a} 1014 \strng{authorbibnamehash}{5646590031d49807385b96f9f6caae4a} 1015 \strng{authornamehash}{5646590031d49807385b96f9f6caae4a} 1016 \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a} 1017 \field{sortinit}{3} 1018 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 1019 \field{labelnamesource}{author} 1020 \field{labeltitlesource}{title} 1021 \field{title}{Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings} 1022 \field{volume}{7967} 1023 \field{year}{2013} 1024 \endentry 1025 \entry{emailauthowasp}{online}{} 1026 \list{organization}{1}{% 1027 {OWASP Foundation}% 1028 } 1029 \field{sortinit}{3} 1030 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 1031 \field{labeltitlesource}{title} 1032 \field{title}{Forgot Password Cheat Sheet} 1033 \field{urlday}{5} 1034 \field{urlmonth}{6} 1035 \field{urlyear}{2020} 1036 \field{year}{2020} 1037 \field{urldateera}{ce} 1038 \verb{urlraw} 1039 \verb https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html 1040 \endverb 1041 \verb{url} 1042 \verb https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html 1043 \endverb 1044 \endentry 1045 \entry{pohlmann2017}{article}{} 1046 \name{author}{4}{}{% 1047 {{hash=613966f471ac9240f4bfce66e6e27b3e}{% 1048 family={Pohlmann}, 1049 familyi={P\bibinitperiod}, 1050 given={Norbert}, 1051 giveni={N\bibinitperiod}}}% 1052 {{hash=6462a03ff4a69f0c01462ca9dfd9c2ac}{% 1053 family={Frintrop}, 1054 familyi={F\bibinitperiod}, 1055 given={Jan-Hendrik}, 1056 giveni={J\bibinithyphendelim H\bibinitperiod}}}% 1057 {{hash=247317f34ce75f08f273ab47d30a4e91}{% 1058 family={Widdermann}, 1059 familyi={W\bibinitperiod}, 1060 given={Rick}, 1061 giveni={R\bibinitperiod}}}% 1062 {{hash=197d288c2557c4675696cefb75461cf0}{% 1063 family={Ziegler}, 1064 familyi={Z\bibinitperiod}, 1065 given={Tim}, 1066 giveni={T\bibinitperiod}}}% 1067 } 1068 \strng{namehash}{46fedf156ec86b72f1439a7e282b9fee} 1069 \strng{fullhash}{7c1027a04280b6542245beeb85db1408} 1070 \strng{bibnamehash}{7c1027a04280b6542245beeb85db1408} 1071 \strng{authorbibnamehash}{7c1027a04280b6542245beeb85db1408} 1072 \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee} 1073 \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408} 1074 \field{sortinit}{3} 1075 \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7} 1076 \field{labelnamesource}{author} 1077 \field{labeltitlesource}{title} 1078 \field{title}{Wenn der Softbot menschliche Identität bestätigt. Videoident-Verfahren II: Die Technik} 1079 \field{year}{2017} 1080 \endentry 1081 \entry{biometric_auth}{article}{} 1082 \name{author}{2}{}{% 1083 {{hash=019f89587e0c1e896a94bec0898d3964}{% 1084 family={Pagnin}, 1085 familyi={P\bibinitperiod}, 1086 given={Elena}, 1087 giveni={E\bibinitperiod}}}% 1088 {{hash=3a3c8efa3b514b0608c70f90d96e7fec}{% 1089 family={Mitrokotsa}, 1090 familyi={M\bibinitperiod}, 1091 given={Aikaterini}, 1092 giveni={A\bibinitperiod}}}% 1093 } 1094 \list{publisher}{1}{% 1095 {Hindawi}% 1096 } 1097 \strng{namehash}{db53816ca2458e8344846c9aa5b3bce3} 1098 \strng{fullhash}{db53816ca2458e8344846c9aa5b3bce3} 1099 \strng{bibnamehash}{db53816ca2458e8344846c9aa5b3bce3} 1100 \strng{authorbibnamehash}{db53816ca2458e8344846c9aa5b3bce3} 1101 \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3} 1102 \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3} 1103 \field{sortinit}{4} 1104 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1105 \field{labelnamesource}{author} 1106 \field{labeltitlesource}{title} 1107 \field{journaltitle}{Security and Communication Networks} 1108 \field{title}{Privacy-preserving biometric authentication: challenges and directions} 1109 \field{volume}{2017} 1110 \field{year}{2017} 1111 \endentry 1112 \entry{ccc_merkel}{online}{} 1113 \name{author}{1}{}{% 1114 {{hash=b7a2e18f77259e34d5b676fd04412bb3}{% 1115 family={Krempl}, 1116 familyi={K\bibinitperiod}, 1117 given={Stefan}, 1118 giveni={S\bibinitperiod}}}% 1119 } 1120 \list{organization}{1}{% 1121 {heise online}% 1122 } 1123 \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3} 1124 \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3} 1125 \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3} 1126 \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3} 1127 \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3} 1128 \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3} 1129 \field{sortinit}{4} 1130 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1131 \field{labelnamesource}{author} 1132 \field{labeltitlesource}{title} 1133 \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck} 1134 \field{urlday}{7} 1135 \field{urlmonth}{3} 1136 \field{urlyear}{2020} 1137 \field{year}{2014} 1138 \field{urldateera}{ce} 1139 \verb{urlraw} 1140 \verb https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html 1141 \endverb 1142 \verb{url} 1143 \verb https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html 1144 \endverb 1145 \endentry 1146 \entry{coinbase}{online}{} 1147 \list{organization}{1}{% 1148 {Coinbase}% 1149 } 1150 \field{sortinit}{4} 1151 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1152 \field{labeltitlesource}{title} 1153 \field{title}{Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet} 1154 \field{urlday}{6} 1155 \field{urlmonth}{6} 1156 \field{urlyear}{2020} 1157 \field{year}{2020} 1158 \field{urldateera}{ce} 1159 \verb{urlraw} 1160 \verb https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc 1161 \endverb 1162 \verb{url} 1163 \verb https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc 1164 \endverb 1165 \endentry 1166 \entry{midata}{book}{} 1167 \name{author}{2}{}{% 1168 {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{% 1169 family={Parag\bibnamedelima Chatterjee}, 1170 familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod}, 1171 given={Emmanuel\bibnamedelima Benoist}, 1172 giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}% 1173 {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{% 1174 family={Nath}, 1175 familyi={N\bibinitperiod}, 1176 given={Asoke}, 1177 giveni={A\bibinitperiod}}}% 1178 } 1179 \list{publisher}{1}{% 1180 {IGI Global}% 1181 } 1182 \strng{namehash}{e366017de179e8187fd5bb233ad210d8} 1183 \strng{fullhash}{e366017de179e8187fd5bb233ad210d8} 1184 \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8} 1185 \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8} 1186 \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8} 1187 \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8} 1188 \field{sortinit}{4} 1189 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1190 \field{labelnamesource}{author} 1191 \field{labeltitlesource}{title} 1192 \field{title}{Applied Approach to Privacy and Security for the Internet of Things} 1193 \field{year}{in print} 1194 \endentry 1195 \entry{marlinspike2011}{article}{} 1196 \name{author}{1}{}{% 1197 {{hash=9dfd0bf532dd1b08969afefcdd7188b5}{% 1198 family={Marlinspike}, 1199 familyi={M\bibinitperiod}, 1200 given={Moxie}, 1201 giveni={M\bibinitperiod}}}% 1202 } 1203 \strng{namehash}{9dfd0bf532dd1b08969afefcdd7188b5} 1204 \strng{fullhash}{9dfd0bf532dd1b08969afefcdd7188b5} 1205 \strng{bibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5} 1206 \strng{authorbibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5} 1207 \strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5} 1208 \strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5} 1209 \field{sortinit}{4} 1210 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1211 \field{labelnamesource}{author} 1212 \field{labeltitlesource}{title} 1213 \field{journaltitle}{Black Hat USA} 1214 \field{title}{SSL and the future of authenticity} 1215 \field{volume}{6} 1216 \field{year}{2011} 1217 \endentry 1218 \entry{josefsson2017}{inproceedings}{} 1219 \name{author}{2}{}{% 1220 {{hash=97ec76c57a8640354d28158df00f4d85}{% 1221 family={Josefsson}, 1222 familyi={J\bibinitperiod}, 1223 given={Simon}, 1224 giveni={S\bibinitperiod}}}% 1225 {{hash=80783b1a7860da0eda4a2ca3f8434f66}{% 1226 family={Liusvaara}, 1227 familyi={L\bibinitperiod}, 1228 given={Ilari}, 1229 giveni={I\bibinitperiod}}}% 1230 } 1231 \strng{namehash}{b3b08047d44ad47ea9a90d61cc647064} 1232 \strng{fullhash}{b3b08047d44ad47ea9a90d61cc647064} 1233 \strng{bibnamehash}{b3b08047d44ad47ea9a90d61cc647064} 1234 \strng{authorbibnamehash}{b3b08047d44ad47ea9a90d61cc647064} 1235 \strng{authornamehash}{b3b08047d44ad47ea9a90d61cc647064} 1236 \strng{authorfullhash}{b3b08047d44ad47ea9a90d61cc647064} 1237 \field{sortinit}{4} 1238 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1239 \field{labelnamesource}{author} 1240 \field{labeltitlesource}{title} 1241 \field{booktitle}{Internet Research Task Force, Crypto Forum Research Group, RFC} 1242 \field{title}{Edwards-curve digital signature algorithm (EdDSA)} 1243 \field{volume}{8032} 1244 \field{year}{2017} 1245 \endentry 1246 \entry{heron2009}{article}{} 1247 \name{author}{1}{}{% 1248 {{hash=f2ca7c0188bc149bef92a85d32759b7b}{% 1249 family={Heron}, 1250 familyi={H\bibinitperiod}, 1251 given={Simon}, 1252 giveni={S\bibinitperiod}}}% 1253 } 1254 \list{publisher}{1}{% 1255 {Elsevier}% 1256 } 1257 \strng{namehash}{f2ca7c0188bc149bef92a85d32759b7b} 1258 \strng{fullhash}{f2ca7c0188bc149bef92a85d32759b7b} 1259 \strng{bibnamehash}{f2ca7c0188bc149bef92a85d32759b7b} 1260 \strng{authorbibnamehash}{f2ca7c0188bc149bef92a85d32759b7b} 1261 \strng{authornamehash}{f2ca7c0188bc149bef92a85d32759b7b} 1262 \strng{authorfullhash}{f2ca7c0188bc149bef92a85d32759b7b} 1263 \field{sortinit}{4} 1264 \field{sortinithash}{9381316451d1b9788675a07e972a12a7} 1265 \field{labelnamesource}{author} 1266 \field{labeltitlesource}{title} 1267 \field{journaltitle}{Network Security} 1268 \field{number}{12} 1269 \field{title}{Advanced encryption standard (AES)} 1270 \field{volume}{2009} 1271 \field{year}{2009} 1272 \field{pages}{8\bibrangedash 12} 1273 \range{pages}{5} 1274 \endentry 1275 \entry{gnu_taler}{online}{} 1276 \list{organization}{1}{% 1277 {Taler Systems SA}% 1278 } 1279 \field{sortinit}{5} 1280 \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} 1281 \field{labeltitlesource}{title} 1282 \field{title}{GNU Taler: Features} 1283 \field{urlday}{2} 1284 \field{urlmonth}{6} 1285 \field{urlyear}{2020} 1286 \field{year}{2020} 1287 \field{urldateera}{ce} 1288 \verb{urlraw} 1289 \verb https://taler.net/en/features.html 1290 \endverb 1291 \verb{url} 1292 \verb https://taler.net/en/features.html 1293 \endverb 1294 \endentry 1295 \entry{postgresql}{online}{} 1296 \list{organization}{1}{% 1297 {The PostgreSQL Global Development Group}% 1298 } 1299 \field{sortinit}{5} 1300 \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} 1301 \field{labeltitlesource}{title} 1302 \field{title}{PostgreSQL: The World's Most Advanced Open Source Relational Database} 1303 \field{urlday}{2} 1304 \field{urlmonth}{6} 1305 \field{urlyear}{2020} 1306 \field{year}{2020} 1307 \field{urldateera}{ce} 1308 \verb{urlraw} 1309 \verb https://www.postgresql.org/ 1310 \endverb 1311 \verb{url} 1312 \verb https://www.postgresql.org/ 1313 \endverb 1314 \endentry 1315 \entry{libcurl}{online}{} 1316 \list{organization}{1}{% 1317 {Curl}% 1318 } 1319 \field{sortinit}{5} 1320 \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} 1321 \field{labeltitlesource}{title} 1322 \field{title}{libcurl - the multiprotocol file transfer library} 1323 \field{urlday}{2} 1324 \field{urlmonth}{6} 1325 \field{urlyear}{2020} 1326 \field{year}{2020} 1327 \field{urldateera}{ce} 1328 \verb{urlraw} 1329 \verb https://curl.haxx.se/libcurl/ 1330 \endverb 1331 \verb{url} 1332 \verb https://curl.haxx.se/libcurl/ 1333 \endverb 1334 \endentry 1335 \entry{libmicrohttpd}{online}{} 1336 \list{organization}{1}{% 1337 {GNU project}% 1338 } 1339 \field{sortinit}{5} 1340 \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c} 1341 \field{labeltitlesource}{title} 1342 \field{title}{GNU Libmicrohttpd} 1343 \field{urlday}{2} 1344 \field{urlmonth}{6} 1345 \field{urlyear}{2020} 1346 \field{year}{2020} 1347 \field{urldateera}{ce} 1348 \verb{urlraw} 1349 \verb https://www.gnu.org/software/libmicrohttpd/? 1350 \endverb 1351 \verb{url} 1352 \verb https://www.gnu.org/software/libmicrohttpd/? 1353 \endverb 1354 \endentry 1355 \enddatalist 1356 \endrefsection 1357 \endinput 1358