anastasis

Credential backup and recovery protocol and service
Log | Files | Refs | Submodules | README | LICENSE

thesis.bbl (53299B)


      1 % $ biblatex auxiliary file $
      2 % $ biblatex bbl format version 3.1 $
      3 % Do not modify the above lines!
      4 %
      5 % This is an auxiliary file used by the 'biblatex' package.
      6 % This file may safely be deleted. It will be recreated by
      7 % biber as required.
      8 %
      9 \begingroup
     10 \makeatletter
     11 \@ifundefined{ver@biblatex.sty}
     12   {\@latex@error
     13      {Missing 'biblatex' package}
     14      {The bibliography requires the 'biblatex' package.}
     15       \aftergroup\endinput}
     16   {}
     17 \endgroup
     18 
     19 
     20 \refsection{0}
     21   \datalist[entry]{none/global//global/global}
     22     \entry{jerome2015}{article}{}
     23       \name{author}{4}{}{%
     24         {{hash=e042fd1cbe6bde0a3c8d7e8074ded97f}{%
     25            family={Jérôme},
     26            familyi={J\bibinitperiod},
     27            given={Brugger},
     28            giveni={B\bibinitperiod}}}%
     29         {{hash=4b13ebea2e8187b9e7ee5a28ece70bf7}{%
     30            family={Angelina},
     31            familyi={A\bibinitperiod},
     32            given={BFH\bibnamedelima Dungga},
     33            giveni={B\bibinitperiod\bibinitdelim D\bibinitperiod}}}%
     34         {{hash=7dc3b7da04ebf4e193781c6ca4441dd1}{%
     35            family={Esther},
     36            familyi={E\bibinitperiod},
     37            given={BFH\bibnamedelima Hefti},
     38            giveni={B\bibinitperiod\bibinitdelim H\bibinitperiod}}}%
     39         {{hash=f4116824e8f06450be45803d598ab7d1}{%
     40            family={ZH},
     41            familyi={Z\bibinitperiod},
     42            given={Kt},
     43            giveni={K\bibinitperiod}}}%
     44       }
     45       \list{organization}{1}{%
     46         {BFH}%
     47       }
     48       \strng{namehash}{7c1cd3857fa434fc3f5603bf8f77898f}
     49       \strng{fullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082}
     50       \strng{bibnamehash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082}
     51       \strng{authorbibnamehash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082}
     52       \strng{authornamehash}{7c1cd3857fa434fc3f5603bf8f77898f}
     53       \strng{authorfullhash}{2a4edbd7fe20c9aeda5b1dfcb9ebb082}
     54       \field{sortinit}{1}
     55       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
     56       \field{labelnamesource}{author}
     57       \field{labeltitlesource}{title}
     58       \field{title}{AHV-Nummer als einheitlicher, organisationsübergreifender Personenidentifikator}
     59       \field{year}{2015}
     60     \endentry
     61     \entry{garfinkel1995}{book}{}
     62       \name{author}{1}{}{%
     63         {{hash=f7ae1c1e91c1c29835e2ff7e98908fa7}{%
     64            family={Garfinkel},
     65            familyi={G\bibinitperiod},
     66            given={Simson},
     67            giveni={S\bibinitperiod}}}%
     68       }
     69       \list{publisher}{1}{%
     70         {" O'Reilly Media, Inc."}%
     71       }
     72       \strng{namehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     73       \strng{fullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     74       \strng{bibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     75       \strng{authorbibnamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     76       \strng{authornamehash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     77       \strng{authorfullhash}{f7ae1c1e91c1c29835e2ff7e98908fa7}
     78       \field{sortinit}{2}
     79       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
     80       \field{labelnamesource}{author}
     81       \field{labeltitlesource}{title}
     82       \field{title}{PGP: pretty good privacy}
     83       \field{year}{1995}
     84     \endentry
     85     \entry{pepdoc}{online}{}
     86       \list{organization}{1}{%
     87         {pEp Security SA}%
     88       }
     89       \field{sortinit}{3}
     90       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
     91       \field{labeltitlesource}{title}
     92       \field{title}{Welcome to p≡p Documentation!}
     93       \field{urlday}{6}
     94       \field{urlmonth}{6}
     95       \field{urlyear}{2020}
     96       \field{year}{2020}
     97       \field{urldateera}{ce}
     98       \verb{urlraw}
     99       \verb https://www.pep.security/docs/
    100       \endverb
    101       \verb{url}
    102       \verb https://www.pep.security/docs/
    103       \endverb
    104     \endentry
    105     \entry{caronni2000}{inproceedings}{}
    106       \name{author}{1}{}{%
    107         {{hash=881bf2fe8d7563c67a7bf0dca669ec1e}{%
    108            family={Caronni},
    109            familyi={C\bibinitperiod},
    110            given={Germano},
    111            giveni={G\bibinitperiod}}}%
    112       }
    113       \list{organization}{1}{%
    114         {IEEE}%
    115       }
    116       \strng{namehash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    117       \strng{fullhash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    118       \strng{bibnamehash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    119       \strng{authorbibnamehash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    120       \strng{authornamehash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    121       \strng{authorfullhash}{881bf2fe8d7563c67a7bf0dca669ec1e}
    122       \field{sortinit}{4}
    123       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
    124       \field{labelnamesource}{author}
    125       \field{labeltitlesource}{title}
    126       \field{booktitle}{Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)}
    127       \field{title}{Walking the web of trust}
    128       \field{year}{2000}
    129       \field{pages}{153\bibrangedash 158}
    130       \range{pages}{6}
    131     \endentry
    132     \entry{LLLW*2017}{inproceedings}{}
    133       \name{author}{7}{}{%
    134         {{hash=c4d8c39e3a63acab6d94c490b6d45028}{%
    135            family={Liu},
    136            familyi={L\bibinitperiod},
    137            given={Yi},
    138            giveni={Y\bibinitperiod}}}%
    139         {{hash=3e1f0e5c79944a684b0e981db2d979bf}{%
    140            family={Li},
    141            familyi={L\bibinitperiod},
    142            given={Ruilin},
    143            giveni={R\bibinitperiod}}}%
    144         {{hash=ded616c8fbaf16eea249759846a9c40f}{%
    145            family={Liu},
    146            familyi={L\bibinitperiod},
    147            given={Xingtong},
    148            giveni={X\bibinitperiod}}}%
    149         {{hash=c33641e67eeaefc87b7821dc9b51ff90}{%
    150            family={Wang},
    151            familyi={W\bibinitperiod},
    152            given={Jian},
    153            giveni={J\bibinitperiod}}}%
    154         {{hash=f4a4cbf770add19c206827116c68732e}{%
    155            family={Zhang},
    156            familyi={Z\bibinitperiod},
    157            given={Lei},
    158            giveni={L\bibinitperiod}}}%
    159         {{hash=6b995a03f55b8c0d7a4ed8e44daae0a5}{%
    160            family={Tang},
    161            familyi={T\bibinitperiod},
    162            given={Chaojing},
    163            giveni={C\bibinitperiod}}}%
    164         {{hash=ba23fbcd4b04b46c4588892f422fe72b}{%
    165            family={Kang},
    166            familyi={K\bibinitperiod},
    167            given={Hongyan},
    168            giveni={H\bibinitperiod}}}%
    169       }
    170       \list{organization}{1}{%
    171         {IEEE}%
    172       }
    173       \strng{namehash}{10c7b94477775db573510e04e477a77b}
    174       \strng{fullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
    175       \strng{bibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
    176       \strng{authorbibnamehash}{40a5ec0e4490a4063bf48a5924ef1c0f}
    177       \strng{authornamehash}{10c7b94477775db573510e04e477a77b}
    178       \strng{authorfullhash}{40a5ec0e4490a4063bf48a5924ef1c0f}
    179       \field{sortinit}{5}
    180       \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
    181       \field{labelnamesource}{author}
    182       \field{labeltitlesource}{title}
    183       \field{booktitle}{2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)}
    184       \field{title}{An efficient method to enhance Bitcoin wallet security}
    185       \field{year}{2017}
    186       \field{pages}{26\bibrangedash 29}
    187       \range{pages}{4}
    188     \endentry
    189     \entry{millions_lost}{online}{}
    190       \name{author}{1}{}{%
    191         {{hash=3648296958ad2ea0461fac7a13e12981}{%
    192            family={Cuthbertson},
    193            familyi={C\bibinitperiod},
    194            given={Anthony},
    195            giveni={A\bibinitperiod}}}%
    196       }
    197       \list{organization}{1}{%
    198         {INDEPENDENT}%
    199       }
    200       \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
    201       \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
    202       \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
    203       \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
    204       \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
    205       \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
    206       \field{sortinit}{6}
    207       \field{sortinithash}{b33bc299efb3c36abec520a4c896a66d}
    208       \field{labelnamesource}{author}
    209       \field{labeltitlesource}{title}
    210       \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' after man dies with only password}
    211       \field{urlday}{7}
    212       \field{urlmonth}{3}
    213       \field{urlyear}{2020}
    214       \field{year}{2019}
    215       \field{urldateera}{ce}
    216       \verb{urlraw}
    217       \verb https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
    218       \endverb
    219       \verb{url}
    220       \verb https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
    221       \endverb
    222     \endentry
    223     \entry{bitcoin-keys}{online}{}
    224       \list{organization}{1}{%
    225         {Bitcoin}%
    226       }
    227       \field{sortinit}{7}
    228       \field{sortinithash}{108d0be1b1bee9773a1173443802c0a3}
    229       \field{labeltitlesource}{title}
    230       \field{title}{BIP 32 - Hierarchical Deterministic Wallets}
    231       \field{urlday}{6}
    232       \field{urlmonth}{6}
    233       \field{urlyear}{2020}
    234       \field{year}{2020}
    235       \field{urldateera}{ce}
    236       \verb{urlraw}
    237       \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
    238       \endverb
    239       \verb{url}
    240       \verb https://github.com/bitcoin/bips/blob/master/bip-0032/derivation.png
    241       \endverb
    242     \endentry
    243     \entry{bajikar2002}{article}{}
    244       \name{author}{1}{}{%
    245         {{hash=b5c45c4b8deb48651c65650f0409e671}{%
    246            family={Bajikar},
    247            familyi={B\bibinitperiod},
    248            given={Sundeep},
    249            giveni={S\bibinitperiod}}}%
    250       }
    251       \strng{namehash}{b5c45c4b8deb48651c65650f0409e671}
    252       \strng{fullhash}{b5c45c4b8deb48651c65650f0409e671}
    253       \strng{bibnamehash}{b5c45c4b8deb48651c65650f0409e671}
    254       \strng{authorbibnamehash}{b5c45c4b8deb48651c65650f0409e671}
    255       \strng{authornamehash}{b5c45c4b8deb48651c65650f0409e671}
    256       \strng{authorfullhash}{b5c45c4b8deb48651c65650f0409e671}
    257       \field{sortinit}{9}
    258       \field{sortinithash}{0a5ebc79d83c96b6579069544c73c7d4}
    259       \field{labelnamesource}{author}
    260       \field{labeltitlesource}{title}
    261       \field{journaltitle}{Mobile Platforms Group Intel Corporation}
    262       \field{title}{Trusted platform module (tpm) based security on notebook pcs-white paper}
    263       \field{volume}{1}
    264       \field{year}{2002}
    265       \field{pages}{20}
    266       \range{pages}{1}
    267     \endentry
    268     \entry{vadhan2012}{article}{}
    269       \true{moreauthor}
    270       \true{morelabelname}
    271       \name{author}{1}{}{%
    272         {{hash=4a7848d2e829c08c64fd0693e3389940}{%
    273            family={Vadhan},
    274            familyi={V\bibinitperiod},
    275            given={Salil\bibnamedelima P},
    276            giveni={S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
    277       }
    278       \list{publisher}{1}{%
    279         {Now Publishers, Inc.}%
    280       }
    281       \strng{namehash}{abb7f98446293f740b141f01ff61554d}
    282       \strng{fullhash}{abb7f98446293f740b141f01ff61554d}
    283       \strng{bibnamehash}{abb7f98446293f740b141f01ff61554d}
    284       \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
    285       \strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
    286       \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
    287       \field{sortinit}{1}
    288       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    289       \field{labelnamesource}{author}
    290       \field{labeltitlesource}{title}
    291       \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer Science}
    292       \field{number}{1--3}
    293       \field{title}{Pseudorandomness}
    294       \field{volume}{7}
    295       \field{year}{2012}
    296       \field{pages}{1\bibrangedash 336}
    297       \range{pages}{336}
    298     \endentry
    299     \entry{nielsen2002}{inproceedings}{}
    300       \name{author}{1}{}{%
    301         {{hash=6535189281ff6a1012638e384823f5cf}{%
    302            family={Nielsen},
    303            familyi={N\bibinitperiod},
    304            given={Jesper\bibnamedelima Buus},
    305            giveni={J\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
    306       }
    307       \list{organization}{1}{%
    308         {Springer}%
    309       }
    310       \strng{namehash}{6535189281ff6a1012638e384823f5cf}
    311       \strng{fullhash}{6535189281ff6a1012638e384823f5cf}
    312       \strng{bibnamehash}{6535189281ff6a1012638e384823f5cf}
    313       \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
    314       \strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
    315       \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
    316       \field{sortinit}{1}
    317       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    318       \field{labelnamesource}{author}
    319       \field{labeltitlesource}{title}
    320       \field{booktitle}{Annual International Cryptology Conference}
    321       \field{title}{A threshold pseudorandom function construction and its applications}
    322       \field{year}{2002}
    323       \field{pages}{401\bibrangedash 416}
    324       \range{pages}{16}
    325     \endentry
    326     \entry{GGM1986}{article}{}
    327       \name{author}{3}{}{%
    328         {{hash=66aba379c7d3adb8af5b662a65c4c140}{%
    329            family={Goldreich},
    330            familyi={G\bibinitperiod},
    331            given={Oded},
    332            giveni={O\bibinitperiod}}}%
    333         {{hash=39e4a0690915f1d991133196a545b37b}{%
    334            family={Goldwasser},
    335            familyi={G\bibinitperiod},
    336            given={Shafi},
    337            giveni={S\bibinitperiod}}}%
    338         {{hash=fb54c363f1b0d126e883c84df49e4790}{%
    339            family={Micali},
    340            familyi={M\bibinitperiod},
    341            given={Silvio},
    342            giveni={S\bibinitperiod}}}%
    343       }
    344       \list{location}{1}{%
    345         {New York, NY, USA}%
    346       }
    347       \list{publisher}{1}{%
    348         {Association for Computing Machinery}%
    349       }
    350       \strng{namehash}{39e304099b960365cdb56b83f4c70df6}
    351       \strng{fullhash}{39e304099b960365cdb56b83f4c70df6}
    352       \strng{bibnamehash}{39e304099b960365cdb56b83f4c70df6}
    353       \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
    354       \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
    355       \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
    356       \field{sortinit}{1}
    357       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    358       \field{labelnamesource}{author}
    359       \field{labeltitlesource}{title}
    360       \field{issn}{0004-5411}
    361       \field{journaltitle}{J. ACM}
    362       \field{month}{8}
    363       \field{number}{4}
    364       \field{title}{How to Construct Random Functions}
    365       \field{volume}{33}
    366       \field{year}{1986}
    367       \field{pages}{792\bibrangedash 807}
    368       \range{pages}{16}
    369       \verb{doi}
    370       \verb 10.1145/6490.6503
    371       \endverb
    372       \verb{urlraw}
    373       \verb https://doi.org/10.1145/6490.6503
    374       \endverb
    375       \verb{url}
    376       \verb https://doi.org/10.1145/6490.6503
    377       \endverb
    378     \endentry
    379     \entry{Preneel1999}{inbook}{}
    380       \name{author}{1}{}{%
    381         {{hash=0b9d4896fca22178c881b5236f351e05}{%
    382            family={Preneel},
    383            familyi={P\bibinitperiod},
    384            given={Bart},
    385            giveni={B\bibinitperiod}}}%
    386       }
    387       \name{editor}{1}{}{%
    388         {{hash=14f9bdb855aa40873ff3dce506ed6fff}{%
    389            family={Damg{å}rd},
    390            familyi={D\bibinitperiod},
    391            given={Ivan\bibnamedelima Bjerre},
    392            giveni={I\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
    393       }
    394       \list{location}{1}{%
    395         {Berlin, Heidelberg}%
    396       }
    397       \list{publisher}{1}{%
    398         {Springer Berlin Heidelberg}%
    399       }
    400       \strng{namehash}{0b9d4896fca22178c881b5236f351e05}
    401       \strng{fullhash}{0b9d4896fca22178c881b5236f351e05}
    402       \strng{bibnamehash}{0b9d4896fca22178c881b5236f351e05}
    403       \strng{authorbibnamehash}{0b9d4896fca22178c881b5236f351e05}
    404       \strng{authornamehash}{0b9d4896fca22178c881b5236f351e05}
    405       \strng{authorfullhash}{0b9d4896fca22178c881b5236f351e05}
    406       \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
    407       \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
    408       \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
    409       \field{sortinit}{1}
    410       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    411       \field{labelnamesource}{author}
    412       \field{labeltitlesource}{title}
    413       \field{abstract}{This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.}
    414       \field{booktitle}{Lectures on Data Security: Modern Cryptology in Theory and Practice}
    415       \field{isbn}{978-3-540-48969-6}
    416       \field{title}{The State of Cryptographic Hash Functions}
    417       \field{year}{1999}
    418       \field{pages}{158}
    419       \range{pages}{1}
    420       \verb{doi}
    421       \verb 10.1007/3-540-48969-X_8
    422       \endverb
    423       \verb{urlraw}
    424       \verb https://doi.org/10.1007/3-540-48969-X_8
    425       \endverb
    426       \verb{url}
    427       \verb https://doi.org/10.1007/3-540-48969-X_8
    428       \endverb
    429     \endentry
    430     \entry{SG2012}{article}{}
    431       \name{author}{2}{}{%
    432         {{hash=831a194fddb2f27c4e2c482b1f72f48a}{%
    433            family={Sobti},
    434            familyi={S\bibinitperiod},
    435            given={Rajeev},
    436            giveni={R\bibinitperiod}}}%
    437         {{hash=c244900d83a048c38628604327a28052}{%
    438            family={Geetha},
    439            familyi={G\bibinitperiod},
    440            given={G},
    441            giveni={G\bibinitperiod}}}%
    442       }
    443       \list{publisher}{1}{%
    444         {International Journal of Computer Science Issues (IJCSI)}%
    445       }
    446       \strng{namehash}{4d5e3f9d17e0c0b2294603b963e91c33}
    447       \strng{fullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
    448       \strng{bibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
    449       \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
    450       \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
    451       \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
    452       \field{sortinit}{1}
    453       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    454       \field{labelnamesource}{author}
    455       \field{labeltitlesource}{title}
    456       \field{journaltitle}{International Journal of Computer Science Issues (IJCSI)}
    457       \field{number}{2}
    458       \field{title}{Cryptographic hash functions: a review}
    459       \field{volume}{9}
    460       \field{year}{2012}
    461       \field{pages}{462}
    462       \range{pages}{1}
    463     \endentry
    464     \entry{RK2011}{article}{}
    465       \name{author}{2}{}{%
    466         {{hash=8f939579bcf2d180bae9f53387cab62b}{%
    467            family={Ramanujam},
    468            familyi={R\bibinitperiod},
    469            given={Sriram},
    470            giveni={S\bibinitperiod}}}%
    471         {{hash=81584ababc9dfe487baae50ab6f0ca8a}{%
    472            family={Karuppiah},
    473            familyi={K\bibinitperiod},
    474            given={Marimuthu},
    475            giveni={M\bibinitperiod}}}%
    476       }
    477       \strng{namehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    478       \strng{fullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    479       \strng{bibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    480       \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    481       \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    482       \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
    483       \field{sortinit}{1}
    484       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    485       \field{labelnamesource}{author}
    486       \field{labeltitlesource}{title}
    487       \field{journaltitle}{IJCSNS International Journal of Computer Science and Network Security}
    488       \field{number}{1}
    489       \field{title}{Designing an algorithm with high Avalanche Effect}
    490       \field{volume}{11}
    491       \field{year}{2011}
    492       \field{pages}{106\bibrangedash 111}
    493       \range{pages}{6}
    494     \endentry
    495     \entry{GJW2011}{inproceedings}{}
    496       \name{author}{3}{}{%
    497         {{hash=74ca2f05d1125811a4211361255b1cf2}{%
    498            family={Gueron},
    499            familyi={G\bibinitperiod},
    500            given={Shay},
    501            giveni={S\bibinitperiod}}}%
    502         {{hash=38e00ab25a60509b785c20ef8caa89b9}{%
    503            family={Johnson},
    504            familyi={J\bibinitperiod},
    505            given={Simon},
    506            giveni={S\bibinitperiod}}}%
    507         {{hash=20a47eef2fa55e0486b02a0e2a0b8d0c}{%
    508            family={Walker},
    509            familyi={W\bibinitperiod},
    510            given={Jesse},
    511            giveni={J\bibinitperiod}}}%
    512       }
    513       \list{organization}{1}{%
    514         {IEEE}%
    515       }
    516       \strng{namehash}{4b253103893adba3aada17995ac73ec0}
    517       \strng{fullhash}{4b253103893adba3aada17995ac73ec0}
    518       \strng{bibnamehash}{4b253103893adba3aada17995ac73ec0}
    519       \strng{authorbibnamehash}{4b253103893adba3aada17995ac73ec0}
    520       \strng{authornamehash}{4b253103893adba3aada17995ac73ec0}
    521       \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0}
    522       \field{sortinit}{1}
    523       \field{sortinithash}{4f6aaa89bab872aa0999fec09ff8e98a}
    524       \field{labelnamesource}{author}
    525       \field{labeltitlesource}{title}
    526       \field{booktitle}{2011 Eighth International Conference on Information Technology: New Generations}
    527       \field{title}{SHA-512/256}
    528       \field{year}{2011}
    529       \field{pages}{354\bibrangedash 358}
    530       \range{pages}{5}
    531     \endentry
    532     \entry{BCK1996}{article}{}
    533       \name{author}{3}{}{%
    534         {{hash=06e2bb2f83d8b669b46db64431509301}{%
    535            family={Bellare},
    536            familyi={B\bibinitperiod},
    537            given={Mihir},
    538            giveni={M\bibinitperiod}}}%
    539         {{hash=7faf0f3900af6c70795ea089d283f02e}{%
    540            family={Canetti},
    541            familyi={C\bibinitperiod},
    542            given={Ran},
    543            giveni={R\bibinitperiod}}}%
    544         {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
    545            family={Krawczyk},
    546            familyi={K\bibinitperiod},
    547            given={Hugo},
    548            giveni={H\bibinitperiod}}}%
    549       }
    550       \strng{namehash}{2527ef0685da3bdb01959cd066adc238}
    551       \strng{fullhash}{2527ef0685da3bdb01959cd066adc238}
    552       \strng{bibnamehash}{2527ef0685da3bdb01959cd066adc238}
    553       \strng{authorbibnamehash}{2527ef0685da3bdb01959cd066adc238}
    554       \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238}
    555       \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238}
    556       \field{sortinit}{2}
    557       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    558       \field{labelnamesource}{author}
    559       \field{labeltitlesource}{title}
    560       \field{journaltitle}{RSA Laboratories’ CryptoBytes}
    561       \field{number}{1}
    562       \field{title}{Message authentication using hash functions: The HMAC construction}
    563       \field{volume}{2}
    564       \field{year}{1996}
    565       \field{pages}{12\bibrangedash 15}
    566       \range{pages}{4}
    567     \endentry
    568     \entry{krawczyk2010}{inproceedings}{}
    569       \name{author}{1}{}{%
    570         {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
    571            family={Krawczyk},
    572            familyi={K\bibinitperiod},
    573            given={Hugo},
    574            giveni={H\bibinitperiod}}}%
    575       }
    576       \list{organization}{1}{%
    577         {Springer}%
    578       }
    579       \strng{namehash}{088445b3855bedf4bcc9d25651eb98b2}
    580       \strng{fullhash}{088445b3855bedf4bcc9d25651eb98b2}
    581       \strng{bibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
    582       \strng{authorbibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
    583       \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2}
    584       \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2}
    585       \field{sortinit}{2}
    586       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    587       \field{labelnamesource}{author}
    588       \field{labeltitlesource}{title}
    589       \field{booktitle}{Annual Cryptology Conference}
    590       \field{title}{Cryptographic extraction and key derivation: The HKDF scheme}
    591       \field{year}{2010}
    592       \field{pages}{631\bibrangedash 648}
    593       \range{pages}{18}
    594     \endentry
    595     \entry{trimberger2012}{book}{}
    596       \name{author}{1}{}{%
    597         {{hash=0afd18d7b25d23c61db1fe942ec1c236}{%
    598            family={Trimberger},
    599            familyi={T\bibinitperiod},
    600            given={Stephen\bibnamedelima M},
    601            giveni={S\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
    602       }
    603       \list{publisher}{1}{%
    604         {Springer Science \& Business Media}%
    605       }
    606       \strng{namehash}{0afd18d7b25d23c61db1fe942ec1c236}
    607       \strng{fullhash}{0afd18d7b25d23c61db1fe942ec1c236}
    608       \strng{bibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
    609       \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
    610       \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
    611       \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
    612       \field{sortinit}{2}
    613       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    614       \field{labelnamesource}{author}
    615       \field{labeltitlesource}{title}
    616       \field{title}{Field-programmable gate array technology}
    617       \field{year}{2012}
    618     \endentry
    619     \entry{madurawe2006}{misc}{}
    620       \name{author}{1}{}{%
    621         {{hash=093f14ec763e8df6227fd18ac8958011}{%
    622            family={Madurawe},
    623            familyi={M\bibinitperiod},
    624            given={Raminda\bibnamedelima Udaya},
    625            giveni={R\bibinitperiod\bibinitdelim U\bibinitperiod}}}%
    626       }
    627       \list{publisher}{1}{%
    628         {Google Patents}%
    629       }
    630       \strng{namehash}{093f14ec763e8df6227fd18ac8958011}
    631       \strng{fullhash}{093f14ec763e8df6227fd18ac8958011}
    632       \strng{bibnamehash}{093f14ec763e8df6227fd18ac8958011}
    633       \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
    634       \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
    635       \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
    636       \field{sortinit}{2}
    637       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    638       \field{labelnamesource}{author}
    639       \field{labeltitlesource}{title}
    640       \field{month}{6}
    641       \field{note}{US Patent 7,064,579}
    642       \field{title}{Alterable application specific integrated circuit (ASIC)}
    643       \field{year}{2006}
    644     \endentry
    645     \entry{BDK2016}{inproceedings}{}
    646       \name{author}{3}{}{%
    647         {{hash=6b9702c0a225b2966f2e07631bcfe935}{%
    648            family={Biryukov},
    649            familyi={B\bibinitperiod},
    650            given={Alex},
    651            giveni={A\bibinitperiod}}}%
    652         {{hash=bf937d804c107f19fafa536592af6563}{%
    653            family={Dinu},
    654            familyi={D\bibinitperiod},
    655            given={Daniel},
    656            giveni={D\bibinitperiod}}}%
    657         {{hash=d38e18b5ec4018e5f12aab4287c4a08f}{%
    658            family={Khovratovich},
    659            familyi={K\bibinitperiod},
    660            given={Dmitry},
    661            giveni={D\bibinitperiod}}}%
    662       }
    663       \list{organization}{1}{%
    664         {IEEE}%
    665       }
    666       \strng{namehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    667       \strng{fullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    668       \strng{bibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    669       \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    670       \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    671       \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
    672       \field{sortinit}{2}
    673       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    674       \field{labelnamesource}{author}
    675       \field{labeltitlesource}{title}
    676       \field{booktitle}{2016 IEEE European Symposium on Security and Privacy (EuroS\&P)}
    677       \field{title}{Argon2: new generation of memory-hard functions for password hashing and other applications}
    678       \field{year}{2016}
    679       \field{pages}{292\bibrangedash 302}
    680       \range{pages}{11}
    681     \endentry
    682     \entry{stamp2003}{article}{}
    683       \name{author}{1}{}{%
    684         {{hash=799c6648cb97b6ffb4e9da11a6e277ac}{%
    685            family={Stamp},
    686            familyi={S\bibinitperiod},
    687            given={Mark},
    688            giveni={M\bibinitperiod}}}%
    689       }
    690       \strng{namehash}{799c6648cb97b6ffb4e9da11a6e277ac}
    691       \strng{fullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
    692       \strng{bibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
    693       \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
    694       \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
    695       \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
    696       \field{sortinit}{2}
    697       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    698       \field{labelnamesource}{author}
    699       \field{labeltitlesource}{title}
    700       \field{journaltitle}{San Jose State University, Department of Computer Science}
    701       \field{title}{Once upon a time-memory tradeoff}
    702       \field{year}{2003}
    703     \endentry
    704     \entry{shamir_sharing}{article}{}
    705       \name{author}{1}{}{%
    706         {{hash=71b77dd8ab33fe646ef25cded49e9881}{%
    707            family={Shamir},
    708            familyi={S\bibinitperiod},
    709            given={Adi},
    710            giveni={A\bibinitperiod}}}%
    711       }
    712       \list{publisher}{1}{%
    713         {ACm New York, NY, USA}%
    714       }
    715       \strng{namehash}{71b77dd8ab33fe646ef25cded49e9881}
    716       \strng{fullhash}{71b77dd8ab33fe646ef25cded49e9881}
    717       \strng{bibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
    718       \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
    719       \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
    720       \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
    721       \field{sortinit}{2}
    722       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    723       \field{labelnamesource}{author}
    724       \field{labeltitlesource}{title}
    725       \field{journaltitle}{Communications of the ACM}
    726       \field{number}{11}
    727       \field{title}{How to share a secret}
    728       \field{volume}{22}
    729       \field{year}{1979}
    730       \field{pages}{612\bibrangedash 613}
    731       \range{pages}{2}
    732     \endentry
    733     \entry{pedersen_sharing_0}{inproceedings}{}
    734       \name{author}{1}{}{%
    735         {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
    736            family={Pedersen},
    737            familyi={P\bibinitperiod},
    738            given={Torben\bibnamedelima Pryds},
    739            giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
    740       }
    741       \list{organization}{1}{%
    742         {Springer}%
    743       }
    744       \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    745       \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
    746       \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    747       \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    748       \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    749       \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
    750       \field{extraname}{1}
    751       \field{sortinit}{2}
    752       \field{sortinithash}{8b555b3791beccb63322c22f3320aa9a}
    753       \field{labelnamesource}{author}
    754       \field{labeltitlesource}{title}
    755       \field{booktitle}{Annual international cryptology conference}
    756       \field{chapter}{0}
    757       \field{title}{Non-interactive and information-theoretic secure verifiable secret sharing}
    758       \field{year}{1991}
    759       \field{pages}{129\bibrangedash 140}
    760       \range{pages}{12}
    761     \endentry
    762     \entry{feldman_sharing}{inproceedings}{}
    763       \name{author}{1}{}{%
    764         {{hash=618e5892290641345f357d52e5ef3c12}{%
    765            family={Feldman},
    766            familyi={F\bibinitperiod},
    767            given={Paul},
    768            giveni={P\bibinitperiod}}}%
    769       }
    770       \list{organization}{1}{%
    771         {IEEE}%
    772       }
    773       \strng{namehash}{618e5892290641345f357d52e5ef3c12}
    774       \strng{fullhash}{618e5892290641345f357d52e5ef3c12}
    775       \strng{bibnamehash}{618e5892290641345f357d52e5ef3c12}
    776       \strng{authorbibnamehash}{618e5892290641345f357d52e5ef3c12}
    777       \strng{authornamehash}{618e5892290641345f357d52e5ef3c12}
    778       \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12}
    779       \field{sortinit}{3}
    780       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    781       \field{labelnamesource}{author}
    782       \field{labeltitlesource}{title}
    783       \field{booktitle}{28th Annual Symposium on Foundations of Computer Science (sfcs 1987)}
    784       \field{title}{A practical scheme for non-interactive verifiable secret sharing}
    785       \field{year}{1987}
    786       \field{pages}{427\bibrangedash 438}
    787       \range{pages}{12}
    788     \endentry
    789     \entry{pedersen_sharing_5.2}{inproceedings}{}
    790       \name{author}{1}{}{%
    791         {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
    792            family={Pedersen},
    793            familyi={P\bibinitperiod},
    794            given={Torben\bibnamedelima Pryds},
    795            giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
    796       }
    797       \list{organization}{1}{%
    798         {Springer}%
    799       }
    800       \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    801       \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
    802       \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    803       \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    804       \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
    805       \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
    806       \field{extraname}{2}
    807       \field{sortinit}{3}
    808       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    809       \field{labelnamesource}{author}
    810       \field{labeltitlesource}{title}
    811       \field{booktitle}{Annual international cryptology conference}
    812       \field{chapter}{5.2}
    813       \field{title}{Non-interactive and information-theoretic secure verifiable secret sharing}
    814       \field{year}{1991}
    815       \field{pages}{129\bibrangedash 140}
    816       \range{pages}{12}
    817     \endentry
    818     \entry{multifactor_authentication}{article}{}
    819       \name{author}{6}{}{%
    820         {{hash=349f11e1663912dcb58a979614214591}{%
    821            family={Ometov},
    822            familyi={O\bibinitperiod},
    823            given={Aleksandr},
    824            giveni={A\bibinitperiod}}}%
    825         {{hash=2210a791565f0e229e45ee4adddbe39a}{%
    826            family={Bezzateev},
    827            familyi={B\bibinitperiod},
    828            given={Sergey},
    829            giveni={S\bibinitperiod}}}%
    830         {{hash=515fcf6ab2738bfda2f35fc8a7aabbad}{%
    831            family={Makitalo},
    832            familyi={M\bibinitperiod},
    833            given={Niko},
    834            giveni={N\bibinitperiod}}}%
    835         {{hash=29e0c47c24b13223f7986b9dd3f37aeb}{%
    836            family={Andreev},
    837            familyi={A\bibinitperiod},
    838            given={Sergey},
    839            giveni={S\bibinitperiod}}}%
    840         {{hash=5d7740b6e2ec0fb41f72f451e980670b}{%
    841            family={Mikkonen},
    842            familyi={M\bibinitperiod},
    843            given={Tommi},
    844            giveni={T\bibinitperiod}}}%
    845         {{hash=1b1c95790f3403d472ac8a4befa0eb49}{%
    846            family={Koucheryavy},
    847            familyi={K\bibinitperiod},
    848            given={Yevgeni},
    849            giveni={Y\bibinitperiod}}}%
    850       }
    851       \list{publisher}{1}{%
    852         {Multidisciplinary Digital Publishing Institute}%
    853       }
    854       \strng{namehash}{45cd1a76e0cdd8946f91bead3b664768}
    855       \strng{fullhash}{c1db872bc8ef36ee51e0526f23769166}
    856       \strng{bibnamehash}{c1db872bc8ef36ee51e0526f23769166}
    857       \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
    858       \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
    859       \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
    860       \field{sortinit}{3}
    861       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    862       \field{labelnamesource}{author}
    863       \field{labeltitlesource}{title}
    864       \field{journaltitle}{Cryptography}
    865       \field{number}{1}
    866       \field{title}{Multi-factor authentication: A survey}
    867       \field{volume}{2}
    868       \field{year}{2018}
    869       \field{pages}{1}
    870       \range{pages}{1}
    871     \endentry
    872     \entry{authentication_methods_review}{article}{}
    873       \name{author}{4}{}{%
    874         {{hash=7320eb44b90aead6870ac2fab7d71076}{%
    875            family={Syed\bibnamedelima Idrus},
    876            familyi={S\bibinitperiod\bibinitdelim I\bibinitperiod},
    877            given={Syed\bibnamedelima Zulkarnain},
    878            giveni={S\bibinitperiod\bibinitdelim Z\bibinitperiod}}}%
    879         {{hash=a09a932af5f7cd55229eaae3115944ad}{%
    880            family={Cherrier},
    881            familyi={C\bibinitperiod},
    882            given={Estelle},
    883            giveni={E\bibinitperiod}}}%
    884         {{hash=b91ea03eff7b52d366d5afa7847a6284}{%
    885            family={Rosenberger},
    886            familyi={R\bibinitperiod},
    887            given={Christophe},
    888            giveni={C\bibinitperiod}}}%
    889         {{hash=315979ea9ce5ac9865a4cf0dae673cd0}{%
    890            family={Schwartzmann},
    891            familyi={S\bibinitperiod},
    892            given={Jean-Jacques},
    893            giveni={J\bibinithyphendelim J\bibinitperiod}}}%
    894       }
    895       \strng{namehash}{ce7e837cc1dbca8dddef9896de46176c}
    896       \strng{fullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
    897       \strng{bibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
    898       \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
    899       \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
    900       \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
    901       \field{sortinit}{3}
    902       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    903       \field{labelnamesource}{author}
    904       \field{labeltitlesource}{title}
    905       \field{journaltitle}{Australian Journal of Basic and Applied Sciences}
    906       \field{number}{5}
    907       \field{title}{A Review on Authentication Methods}
    908       \field{volume}{7}
    909       \field{year}{2013}
    910       \field{pages}{95\bibrangedash 107}
    911       \range{pages}{13}
    912       \verb{urlraw}
    913       \verb https://hal.archives-ouvertes.fr/hal-00912435
    914       \endverb
    915       \verb{url}
    916       \verb https://hal.archives-ouvertes.fr/hal-00912435
    917       \endverb
    918     \endentry
    919     \entry{just2004}{article}{}
    920       \name{author}{1}{}{%
    921         {{hash=daa648a2c605762c09bfaab94d0f2168}{%
    922            family={Just},
    923            familyi={J\bibinitperiod},
    924            given={Mike},
    925            giveni={M\bibinitperiod}}}%
    926       }
    927       \list{publisher}{1}{%
    928         {IEEE}%
    929       }
    930       \strng{namehash}{daa648a2c605762c09bfaab94d0f2168}
    931       \strng{fullhash}{daa648a2c605762c09bfaab94d0f2168}
    932       \strng{bibnamehash}{daa648a2c605762c09bfaab94d0f2168}
    933       \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
    934       \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
    935       \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
    936       \field{sortinit}{3}
    937       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    938       \field{labelnamesource}{author}
    939       \field{labeltitlesource}{title}
    940       \field{journaltitle}{IEEE Security \& Privacy}
    941       \field{number}{5}
    942       \field{title}{Designing and evaluating challenge-question systems}
    943       \field{volume}{2}
    944       \field{year}{2004}
    945       \field{pages}{32\bibrangedash 39}
    946       \range{pages}{8}
    947     \endentry
    948     \entry{MBSS2013}{inproceedings}{}
    949       \name{author}{4}{}{%
    950         {{hash=0c05d559d041112c87e63b05c5a7262b}{%
    951            family={Mulliner},
    952            familyi={M\bibinitperiod},
    953            given={Collin},
    954            giveni={C\bibinitperiod}}}%
    955         {{hash=4e0292e00a4787b4db10b2dff39f4a1f}{%
    956            family={Borgaonkar},
    957            familyi={B\bibinitperiod},
    958            given={Ravishankar},
    959            giveni={R\bibinitperiod}}}%
    960         {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
    961            family={Stewin},
    962            familyi={S\bibinitperiod},
    963            given={Patrick},
    964            giveni={P\bibinitperiod}}}%
    965         {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
    966            family={Seifert},
    967            familyi={S\bibinitperiod},
    968            given={Jean-Pierre},
    969            giveni={J\bibinithyphendelim P\bibinitperiod}}}%
    970       }
    971       \list{organization}{1}{%
    972         {Springer}%
    973       }
    974       \strng{namehash}{adce78e3f1e04476f35b2b5fcb6c6262}
    975       \strng{fullhash}{85e8ef541ae3f71805b7382856006c85}
    976       \strng{bibnamehash}{85e8ef541ae3f71805b7382856006c85}
    977       \strng{authorbibnamehash}{85e8ef541ae3f71805b7382856006c85}
    978       \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262}
    979       \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85}
    980       \field{sortinit}{3}
    981       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
    982       \field{labelnamesource}{author}
    983       \field{labeltitlesource}{title}
    984       \field{booktitle}{International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment}
    985       \field{title}{SMS-based one-time passwords: attacks and defense}
    986       \field{year}{2013}
    987       \field{pages}{150\bibrangedash 159}
    988       \range{pages}{10}
    989     \endentry
    990     \entry{rieck_detection}{book}{}
    991       \name{author}{3}{}{%
    992         {{hash=47449209bde605e33642aeb4dcc23bf2}{%
    993            family={Rieck},
    994            familyi={R\bibinitperiod},
    995            given={Konrad},
    996            giveni={K\bibinitperiod}}}%
    997         {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
    998            family={Stewin},
    999            familyi={S\bibinitperiod},
   1000            given={Patrick},
   1001            giveni={P\bibinitperiod}}}%
   1002         {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
   1003            family={Seifert},
   1004            familyi={S\bibinitperiod},
   1005            given={Jean-Pierre},
   1006            giveni={J\bibinithyphendelim P\bibinitperiod}}}%
   1007       }
   1008       \list{publisher}{1}{%
   1009         {Springer}%
   1010       }
   1011       \strng{namehash}{5646590031d49807385b96f9f6caae4a}
   1012       \strng{fullhash}{5646590031d49807385b96f9f6caae4a}
   1013       \strng{bibnamehash}{5646590031d49807385b96f9f6caae4a}
   1014       \strng{authorbibnamehash}{5646590031d49807385b96f9f6caae4a}
   1015       \strng{authornamehash}{5646590031d49807385b96f9f6caae4a}
   1016       \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a}
   1017       \field{sortinit}{3}
   1018       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
   1019       \field{labelnamesource}{author}
   1020       \field{labeltitlesource}{title}
   1021       \field{title}{Detection of Intrusions and Malware, and Vulnerability Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings}
   1022       \field{volume}{7967}
   1023       \field{year}{2013}
   1024     \endentry
   1025     \entry{emailauthowasp}{online}{}
   1026       \list{organization}{1}{%
   1027         {OWASP Foundation}%
   1028       }
   1029       \field{sortinit}{3}
   1030       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
   1031       \field{labeltitlesource}{title}
   1032       \field{title}{Forgot Password Cheat Sheet}
   1033       \field{urlday}{5}
   1034       \field{urlmonth}{6}
   1035       \field{urlyear}{2020}
   1036       \field{year}{2020}
   1037       \field{urldateera}{ce}
   1038       \verb{urlraw}
   1039       \verb https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
   1040       \endverb
   1041       \verb{url}
   1042       \verb https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
   1043       \endverb
   1044     \endentry
   1045     \entry{pohlmann2017}{article}{}
   1046       \name{author}{4}{}{%
   1047         {{hash=613966f471ac9240f4bfce66e6e27b3e}{%
   1048            family={Pohlmann},
   1049            familyi={P\bibinitperiod},
   1050            given={Norbert},
   1051            giveni={N\bibinitperiod}}}%
   1052         {{hash=6462a03ff4a69f0c01462ca9dfd9c2ac}{%
   1053            family={Frintrop},
   1054            familyi={F\bibinitperiod},
   1055            given={Jan-Hendrik},
   1056            giveni={J\bibinithyphendelim H\bibinitperiod}}}%
   1057         {{hash=247317f34ce75f08f273ab47d30a4e91}{%
   1058            family={Widdermann},
   1059            familyi={W\bibinitperiod},
   1060            given={Rick},
   1061            giveni={R\bibinitperiod}}}%
   1062         {{hash=197d288c2557c4675696cefb75461cf0}{%
   1063            family={Ziegler},
   1064            familyi={Z\bibinitperiod},
   1065            given={Tim},
   1066            giveni={T\bibinitperiod}}}%
   1067       }
   1068       \strng{namehash}{46fedf156ec86b72f1439a7e282b9fee}
   1069       \strng{fullhash}{7c1027a04280b6542245beeb85db1408}
   1070       \strng{bibnamehash}{7c1027a04280b6542245beeb85db1408}
   1071       \strng{authorbibnamehash}{7c1027a04280b6542245beeb85db1408}
   1072       \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee}
   1073       \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408}
   1074       \field{sortinit}{3}
   1075       \field{sortinithash}{ad6fe7482ffbd7b9f99c9e8b5dccd3d7}
   1076       \field{labelnamesource}{author}
   1077       \field{labeltitlesource}{title}
   1078       \field{title}{Wenn der Softbot menschliche Identität bestätigt. Videoident-Verfahren II: Die Technik}
   1079       \field{year}{2017}
   1080     \endentry
   1081     \entry{biometric_auth}{article}{}
   1082       \name{author}{2}{}{%
   1083         {{hash=019f89587e0c1e896a94bec0898d3964}{%
   1084            family={Pagnin},
   1085            familyi={P\bibinitperiod},
   1086            given={Elena},
   1087            giveni={E\bibinitperiod}}}%
   1088         {{hash=3a3c8efa3b514b0608c70f90d96e7fec}{%
   1089            family={Mitrokotsa},
   1090            familyi={M\bibinitperiod},
   1091            given={Aikaterini},
   1092            giveni={A\bibinitperiod}}}%
   1093       }
   1094       \list{publisher}{1}{%
   1095         {Hindawi}%
   1096       }
   1097       \strng{namehash}{db53816ca2458e8344846c9aa5b3bce3}
   1098       \strng{fullhash}{db53816ca2458e8344846c9aa5b3bce3}
   1099       \strng{bibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
   1100       \strng{authorbibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
   1101       \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3}
   1102       \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3}
   1103       \field{sortinit}{4}
   1104       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1105       \field{labelnamesource}{author}
   1106       \field{labeltitlesource}{title}
   1107       \field{journaltitle}{Security and Communication Networks}
   1108       \field{title}{Privacy-preserving biometric authentication: challenges and directions}
   1109       \field{volume}{2017}
   1110       \field{year}{2017}
   1111     \endentry
   1112     \entry{ccc_merkel}{online}{}
   1113       \name{author}{1}{}{%
   1114         {{hash=b7a2e18f77259e34d5b676fd04412bb3}{%
   1115            family={Krempl},
   1116            familyi={K\bibinitperiod},
   1117            given={Stefan},
   1118            giveni={S\bibinitperiod}}}%
   1119       }
   1120       \list{organization}{1}{%
   1121         {heise online}%
   1122       }
   1123       \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3}
   1124       \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3}
   1125       \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
   1126       \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
   1127       \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
   1128       \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
   1129       \field{sortinit}{4}
   1130       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1131       \field{labelnamesource}{author}
   1132       \field{labeltitlesource}{title}
   1133       \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens Fingerabdruck}
   1134       \field{urlday}{7}
   1135       \field{urlmonth}{3}
   1136       \field{urlyear}{2020}
   1137       \field{year}{2014}
   1138       \field{urldateera}{ce}
   1139       \verb{urlraw}
   1140       \verb https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
   1141       \endverb
   1142       \verb{url}
   1143       \verb https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
   1144       \endverb
   1145     \endentry
   1146     \entry{coinbase}{online}{}
   1147       \list{organization}{1}{%
   1148         {Coinbase}%
   1149       }
   1150       \field{sortinit}{4}
   1151       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1152       \field{labeltitlesource}{title}
   1153       \field{title}{Backup your encrypted private keys on Google Drive and iCloud with Coinbase Wallet}
   1154       \field{urlday}{6}
   1155       \field{urlmonth}{6}
   1156       \field{urlyear}{2020}
   1157       \field{year}{2020}
   1158       \field{urldateera}{ce}
   1159       \verb{urlraw}
   1160       \verb https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
   1161       \endverb
   1162       \verb{url}
   1163       \verb https://blog.coinbase.com/backup-your-private-keys-on-google-drive-and-icloud-with-coinbase-wallet-3c3f3fdc86dc
   1164       \endverb
   1165     \endentry
   1166     \entry{midata}{book}{}
   1167       \name{author}{2}{}{%
   1168         {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
   1169            family={Parag\bibnamedelima Chatterjee},
   1170            familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
   1171            given={Emmanuel\bibnamedelima Benoist},
   1172            giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
   1173         {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
   1174            family={Nath},
   1175            familyi={N\bibinitperiod},
   1176            given={Asoke},
   1177            giveni={A\bibinitperiod}}}%
   1178       }
   1179       \list{publisher}{1}{%
   1180         {IGI Global}%
   1181       }
   1182       \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
   1183       \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
   1184       \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
   1185       \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
   1186       \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
   1187       \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
   1188       \field{sortinit}{4}
   1189       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1190       \field{labelnamesource}{author}
   1191       \field{labeltitlesource}{title}
   1192       \field{title}{Applied Approach to Privacy and Security for the Internet of Things}
   1193       \field{year}{in print}
   1194     \endentry
   1195     \entry{marlinspike2011}{article}{}
   1196       \name{author}{1}{}{%
   1197         {{hash=9dfd0bf532dd1b08969afefcdd7188b5}{%
   1198            family={Marlinspike},
   1199            familyi={M\bibinitperiod},
   1200            given={Moxie},
   1201            giveni={M\bibinitperiod}}}%
   1202       }
   1203       \strng{namehash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1204       \strng{fullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1205       \strng{bibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1206       \strng{authorbibnamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1207       \strng{authornamehash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1208       \strng{authorfullhash}{9dfd0bf532dd1b08969afefcdd7188b5}
   1209       \field{sortinit}{4}
   1210       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1211       \field{labelnamesource}{author}
   1212       \field{labeltitlesource}{title}
   1213       \field{journaltitle}{Black Hat USA}
   1214       \field{title}{SSL and the future of authenticity}
   1215       \field{volume}{6}
   1216       \field{year}{2011}
   1217     \endentry
   1218     \entry{josefsson2017}{inproceedings}{}
   1219       \name{author}{2}{}{%
   1220         {{hash=97ec76c57a8640354d28158df00f4d85}{%
   1221            family={Josefsson},
   1222            familyi={J\bibinitperiod},
   1223            given={Simon},
   1224            giveni={S\bibinitperiod}}}%
   1225         {{hash=80783b1a7860da0eda4a2ca3f8434f66}{%
   1226            family={Liusvaara},
   1227            familyi={L\bibinitperiod},
   1228            given={Ilari},
   1229            giveni={I\bibinitperiod}}}%
   1230       }
   1231       \strng{namehash}{b3b08047d44ad47ea9a90d61cc647064}
   1232       \strng{fullhash}{b3b08047d44ad47ea9a90d61cc647064}
   1233       \strng{bibnamehash}{b3b08047d44ad47ea9a90d61cc647064}
   1234       \strng{authorbibnamehash}{b3b08047d44ad47ea9a90d61cc647064}
   1235       \strng{authornamehash}{b3b08047d44ad47ea9a90d61cc647064}
   1236       \strng{authorfullhash}{b3b08047d44ad47ea9a90d61cc647064}
   1237       \field{sortinit}{4}
   1238       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1239       \field{labelnamesource}{author}
   1240       \field{labeltitlesource}{title}
   1241       \field{booktitle}{Internet Research Task Force, Crypto Forum Research Group, RFC}
   1242       \field{title}{Edwards-curve digital signature algorithm (EdDSA)}
   1243       \field{volume}{8032}
   1244       \field{year}{2017}
   1245     \endentry
   1246     \entry{heron2009}{article}{}
   1247       \name{author}{1}{}{%
   1248         {{hash=f2ca7c0188bc149bef92a85d32759b7b}{%
   1249            family={Heron},
   1250            familyi={H\bibinitperiod},
   1251            given={Simon},
   1252            giveni={S\bibinitperiod}}}%
   1253       }
   1254       \list{publisher}{1}{%
   1255         {Elsevier}%
   1256       }
   1257       \strng{namehash}{f2ca7c0188bc149bef92a85d32759b7b}
   1258       \strng{fullhash}{f2ca7c0188bc149bef92a85d32759b7b}
   1259       \strng{bibnamehash}{f2ca7c0188bc149bef92a85d32759b7b}
   1260       \strng{authorbibnamehash}{f2ca7c0188bc149bef92a85d32759b7b}
   1261       \strng{authornamehash}{f2ca7c0188bc149bef92a85d32759b7b}
   1262       \strng{authorfullhash}{f2ca7c0188bc149bef92a85d32759b7b}
   1263       \field{sortinit}{4}
   1264       \field{sortinithash}{9381316451d1b9788675a07e972a12a7}
   1265       \field{labelnamesource}{author}
   1266       \field{labeltitlesource}{title}
   1267       \field{journaltitle}{Network Security}
   1268       \field{number}{12}
   1269       \field{title}{Advanced encryption standard (AES)}
   1270       \field{volume}{2009}
   1271       \field{year}{2009}
   1272       \field{pages}{8\bibrangedash 12}
   1273       \range{pages}{5}
   1274     \endentry
   1275     \entry{gnu_taler}{online}{}
   1276       \list{organization}{1}{%
   1277         {Taler Systems SA}%
   1278       }
   1279       \field{sortinit}{5}
   1280       \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
   1281       \field{labeltitlesource}{title}
   1282       \field{title}{GNU Taler: Features}
   1283       \field{urlday}{2}
   1284       \field{urlmonth}{6}
   1285       \field{urlyear}{2020}
   1286       \field{year}{2020}
   1287       \field{urldateera}{ce}
   1288       \verb{urlraw}
   1289       \verb https://taler.net/en/features.html
   1290       \endverb
   1291       \verb{url}
   1292       \verb https://taler.net/en/features.html
   1293       \endverb
   1294     \endentry
   1295     \entry{postgresql}{online}{}
   1296       \list{organization}{1}{%
   1297         {The PostgreSQL Global Development Group}%
   1298       }
   1299       \field{sortinit}{5}
   1300       \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
   1301       \field{labeltitlesource}{title}
   1302       \field{title}{PostgreSQL: The World's Most Advanced Open Source Relational Database}
   1303       \field{urlday}{2}
   1304       \field{urlmonth}{6}
   1305       \field{urlyear}{2020}
   1306       \field{year}{2020}
   1307       \field{urldateera}{ce}
   1308       \verb{urlraw}
   1309       \verb https://www.postgresql.org/
   1310       \endverb
   1311       \verb{url}
   1312       \verb https://www.postgresql.org/
   1313       \endverb
   1314     \endentry
   1315     \entry{libcurl}{online}{}
   1316       \list{organization}{1}{%
   1317         {Curl}%
   1318       }
   1319       \field{sortinit}{5}
   1320       \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
   1321       \field{labeltitlesource}{title}
   1322       \field{title}{libcurl - the multiprotocol file transfer library}
   1323       \field{urlday}{2}
   1324       \field{urlmonth}{6}
   1325       \field{urlyear}{2020}
   1326       \field{year}{2020}
   1327       \field{urldateera}{ce}
   1328       \verb{urlraw}
   1329       \verb https://curl.haxx.se/libcurl/
   1330       \endverb
   1331       \verb{url}
   1332       \verb https://curl.haxx.se/libcurl/
   1333       \endverb
   1334     \endentry
   1335     \entry{libmicrohttpd}{online}{}
   1336       \list{organization}{1}{%
   1337         {GNU project}%
   1338       }
   1339       \field{sortinit}{5}
   1340       \field{sortinithash}{20e9b4b0b173788c5dace24730f47d8c}
   1341       \field{labeltitlesource}{title}
   1342       \field{title}{GNU Libmicrohttpd}
   1343       \field{urlday}{2}
   1344       \field{urlmonth}{6}
   1345       \field{urlyear}{2020}
   1346       \field{year}{2020}
   1347       \field{urldateera}{ce}
   1348       \verb{urlraw}
   1349       \verb https://www.gnu.org/software/libmicrohttpd/?
   1350       \endverb
   1351       \verb{url}
   1352       \verb https://www.gnu.org/software/libmicrohttpd/?
   1353       \endverb
   1354     \endentry
   1355   \enddatalist
   1356 \endrefsection
   1357 \endinput
   1358