-
Notifications
You must be signed in to change notification settings - Fork 0
/
Honey Encryption.bbl
68 lines (56 loc) · 2.26 KB
/
Honey Encryption.bbl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
\begin{thebibliography}{fSidI14}
\bibitem[BN00]{AE2000}
Mihir Bellare und Chanathip Namprempre.
\newblock {Authenticated Encryption: Relations among Notions and Analysis of
the Generic Composition Paradigm}.
\newblock In {\em Advances in Cryptology - ASIACRYPT 2000}. Springer Berlin
Heidelberg, 2000.
\bibitem[fSidI14]{BSI2014}
Bundesamt für Sicherheit in~der Informationstechnik.
\newblock {Technische Richtlinie: Kryptographische Verfahren: Empfehlungen und
Schlüssellängen}.
\newblock TR-02102-1, Januar 2014.
\bibitem[JR]{FolienVortrag}
Ari Juels und Thomas Ristenpart.
\newblock {Honey Encryption: Security Beyond the Brute-force Bound}.
\newblock \url{http://ec14.compute.dtu.dk/talks/19.pdf}.
\newblock Zugriff am 16.12.2014.
\bibitem[JR13]{ACM13}
Ari Juels und Ronald~L. Rivest.
\newblock {Honeywords: Making Password-Cracking Detectable}.
\newblock In {\em Proceedings ACM CCS'13}, Berlin, Germany, November 2013.
\bibitem[JR14a]{IEEE2014}
Ari Juels und Thomas Ristenpart.
\newblock {Honey Encryption - Encryption beyond the Brute-Force Barrier}.
\newblock {\em IEEE Security \& Privacy}, 12(4):59--62, April 2014.
\bibitem[JR14b]{EURO2014}
Ari Juels und Thomas Ristenpart.
\newblock {Honey Encryption - Security Beyond the Brute-Force Bound}.
\newblock In {\em EUROCRYPT 2014}, Kopenhagen, D{\"a}nemark, Mai 2014.
\bibitem[Jue]{CRCS2014}
Ari Juels.
\newblock {The Password That Never Was}.
\newblock
\url{http://crcs.seas.harvard.edu/event/ari-juels-the-password-that-never-was}.
\newblock Zugriff am 27.10.2014.
\bibitem[Jue14]{SACMAT2014}
Ari Juels.
\newblock {A Bodyguard of Lies - The Use of Honey Objects in Information
Security}.
\newblock In {\em 19. ACM SACMAT}, London, Kanada, Juni 2014.
\bibitem[Kal00]{pbkdf2000}
B.~Kaliski.
\newblock {PKCS \#5: Password-Based Cryptography Specification Version 2.0}.
\newblock RFC 2898, 2000.
\bibitem[Kol08]{Inversionsmethode}
M.~Kolonko.
\newblock {\em Stochastische Simulation: Grundlagen, Algorithmen und
Anwendungen}.
\newblock Vieweg Studium. Vieweg Verlag, Friedr, \& Sohn Verlagsgesellschaft
mbH, 2008.
\bibitem[Sch06]{Schneier2006}
Bruce Schneier.
\newblock {\em {Angewandte Kryptographie - Der Klassiker. Protokolle,
Algorithmen und Sourcecode in C}}.
\newblock Pearson Studium, München, 2006.
\end{thebibliography}