Abstract
For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boyen, X.: Robust and Reusable Fuzzy Extractors. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, Springer, Heidelberg (2007)
Boyen, X.: Halting Password Puzzles – hard-to-break encryption from human-memorable keys. In: SECURITY 2007, The USENIX Association (2007)
Boyen, X.: Hardened Password Authentication – mulitple mobile credentials from a single short secret. Manuscript (2008)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Boyen, X. (2008). New Paradigms for Password Security. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy. ACISP 2008. Lecture Notes in Computer Science, vol 5107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70500-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-70500-0_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69971-2
Online ISBN: 978-3-540-70500-0
eBook Packages: Computer ScienceComputer Science (R0)