{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:10:51Z","timestamp":1763968251370,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319636962"},{"type":"electronic","value":"9783319636979"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63697-9_23","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T04:07:12Z","timestamp":1501560432000},"page":"682-710","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing"],"prefix":"10.1007","author":[{"given":"Joanne","family":"Woodage","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Yevgeniy","family":"Dodis","sequence":"additional","affiliation":[]},{"given":"Ari","family":"Juels","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-662-53008-5_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"J Alwen","year":"2016","unstructured":"Alwen, J., Blocki, J.: Efficiently computing data-independent memory-hard functions. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 241\u2013271. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-53008-5_9"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-662-49896-5_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Alwen","year":"2016","unstructured":"Alwen, J., Chen, B., Kamath, C., Kolmogorov, V., Pietrzak, K., Tessaro, S.: On the complexity of scrypt and proofs of space in the parallel random oracle model. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 358\u2013387. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49896-5_13"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-662-49896-5_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Alwen","year":"2016","unstructured":"Alwen, J., Chen, B., Kamath, C., Kolmogorov, V., Pietrzak, K., Tessaro, S.: On the complexity of scrypt and proofs of space in the parallel random oracle model. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 358\u2013387. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49896-5_13"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-32009-5_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"M Bellare","year":"2012","unstructured":"Bellare, M., Ristenpart, T., Tessaro, S.: Multi-instance security and its application to password-based cryptography. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 312\u2013329. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-32009-5_19"},{"issue":"2","key":"23_CR5","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"CH Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210\u2013229 (1988)","journal-title":"SIAM J. Comput."},{"key":"23_CR6","unstructured":"Biryukov, A., Dinu, D., Khovratovich, D.: Argon and argon2: password hashing scheme. Technical report (2015)"},{"key":"23_CR7","unstructured":"Bonneau, J.: Guessing human-chosen secrets. Ph.D. thesis, University of Cambridge. http:\/\/www.cl.cam.ac.uk\/jcb82\/doc\/2012-jbonneau-phd_thesis.pdf"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: IEEE Symposium on Security and Privacy (SP), pp. 538\u2013552. IEEE (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"23_CR9","unstructured":"Bowes, R.: Skull Security, Passwords. https:\/\/wiki.skullsecurity.org\/Passwords"},{"key":"23_CR10","unstructured":"Boztas, S.: Entropies, guessing, and cryptography. Department of Mathematics, Royal Melbourne Institute of Technology. Technical report, vol. 6, pp. 2\u20133 (1999)"},{"key":"23_CR11","unstructured":"Castelluccia, C., D\u00fcrmuth, M., Perito, D.: Adaptive password-strength meters from markov models. In: NDSS (2012)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Athalye, A., Akhawe, D., Juels, A., Ristenpart, T.: pASSWORD tYPOS and how to correct them securely. In: 2015 IEEE Symposium on Security and Privacy (SP (2016)","DOI":"10.1109\/SP.2016.53"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24676-3_31"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-1-84628-984-2_5","volume-title":"Security with Noisy Data","author":"Y Dodis","year":"2007","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, pp. 79\u201399. Springer, London (2007)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-662-53887-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"B Fuller","year":"2016","unstructured":"Fuller, B., Reyzin, L., Smith, A.: When are fuzzy extractors possible? In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 277\u2013306. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-53887-6_10"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-55220-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"A Juels","year":"2014","unstructured":"Juels, A., Ristenpart, T.: Honey encryption: security beyond the brute-force bound. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 293\u2013310. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-55220-5_17"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Tsudik, G. (ed.) Sixth ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM Press (1999)","DOI":"10.1145\/319709.319714"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS #5: password-based cryptography specification version 2.0, rFC 2289 (2000)","DOI":"10.17487\/rfc2898"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, W., Luo, M., Li, N.: A study of probabilistic password models. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 689\u2013704. IEEE (2014)","DOI":"10.1109\/SP.2014.50"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11880561_16","volume-title":"String Processing and Information Retrieval","author":"A Mehler","year":"2006","unstructured":"Mehler, A., Skiena, S.: Improving usability through password-corrective hashing. In: Crestani, F., Ferragina, P., Sanderson, M. (eds.) SPIRE 2006. LNCS, vol. 4209, pp. 193\u2013204. Springer, Heidelberg (2006). doi:10.1007\/11880561_16"},{"key":"23_CR21","unstructured":"Melicher, W., Ur, B., Segreti, S.M., Komanduri, S., Bauer, L., Christin, N., Cranor, L.F.: Fast, lean and accurate: modeling password guessability using neural networks. In: Proceedings of USENIX Security (2016)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic key generation from voice. In: Proceedings of 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp. 202\u2013213. IEEE (2001)","DOI":"10.1109\/SECPRI.2001.924299"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM conference on Computer and Communications Security, pp. 48\u201356. ACM (1997)","DOI":"10.1145\/266420.266434"},{"issue":"4","key":"23_CR24","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","volume":"16","author":"F Monrose","year":"2000","unstructured":"Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16(4), 351\u2013359 (2000)","journal-title":"Future Gener. Comput. Syst."},{"issue":"5","key":"23_CR25","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1284320.1284322","volume":"54","author":"R Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Rabani, Y.: Low distortion embeddings for edit distance. J. ACM (JACM) 54(5), 23 (2007)","journal-title":"J. ACM (JACM)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Percival, C., Josefsson, S.: The scrypt password-based key derivation function. Technical report (2016)","DOI":"10.17487\/RFC7914"},{"key":"23_CR27","unstructured":"PKCS #5: Password-based cryptography standard (RFC 2898). RSA Data Security, Inc., version 2.0, September 2000"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-24676-3_7","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"R Renner","year":"2004","unstructured":"Renner, R., Wolf, S.: The exact price for unconditionally secure asymmetric cryptography. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 109\u2013125. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24676-3_7"},{"key":"23_CR29","unstructured":"Siegler, M.: One Of the 32 Million With A RockYou Account? You May Want To Change All Your Passwords. Like Now. Tech Crunch, 14 December 2009"},{"key":"23_CR30","unstructured":"\u0160koric, B., Tuyls, P.: An efficient fuzzy extractor for limited noise. In: Symposium on Information Theory in the Benelux, pp. 193\u2013200 (2009)"},{"key":"23_CR31","volume-title":"Why Your Next Phone Will Include Fingerprint, Facial, and Voice Recognition","author":"T Wadhwa","year":"2013","unstructured":"Wadhwa, T.: Why Your Next Phone Will Include Fingerprint, Facial, and Voice Recognition. Forbes, New York (2013)"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., de Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: IEEE Symposium on Security and Privacy (SP), pp. 162\u2013175 (2009)","DOI":"10.1109\/SP.2009.8"},{"key":"23_CR33","unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: Proceedings of USENIX Security (2016)"},{"key":"23_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-30574-3_17","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"FF Yao","year":"2005","unstructured":"Yao, F.F., Yin, Y.L.: Design and analysis of password-based key derivation functions. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 245\u2013261. Springer, Heidelberg (2005). doi:10.1007\/978-3-540-30574-3_17"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Liu, F., Zhang, L., Zhang, D.: A comparative study on quality assessment of high resolution fingerprint images. In: International Conference on Image Processing (ICIP), pp. 3089\u20133092 (2010)","DOI":"10.1109\/ICIP.2010.5648800"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63697-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:21:40Z","timestamp":1750792900000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-63697-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319636962","9783319636979"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63697-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"2 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"37","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iacr.org\/conferences\/crypto2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}