{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:17:12Z","timestamp":1760203032668,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662643303"},{"type":"electronic","value":"9783662643310"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_20","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T19:16:12Z","timestamp":1634930172000},"page":"382-405","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DAHash: Distribution Aware Tuning of Password Hashing Costs"],"prefix":"10.1007","author":[{"given":"Wenjie","family":"Bai","sequence":"first","affiliation":[]},{"given":"Jeremiah","family":"Blocki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"20_CR1","unstructured":"Biteopt algorithm. https:\/\/github.com\/avaneev\/biteopt"},{"key":"20_CR2","doi-asserted-by":"publisher","unstructured":"Allodi, L.: Economic factors of vulnerability trade and exploitation. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, Dallas, TX, USA, pp. 1483\u20131499. ACM Press, 31 October\u20132 November 2017. https:\/\/doi.org\/10.1145\/3133956.3133960","DOI":"10.1145\/3133956.3133960"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Alwen, J., Blocki, J., Harsha, B.: Practical graphs for optimal side-channel resistant memory-hard functions. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, Dallas, TX, USA, pp. 1001\u20131017. ACM Press, 31 October\u20132 November 2017. https:\/\/doi.org\/10.1145\/3133956.3134031","DOI":"10.1145\/3133956.3134031"},{"key":"20_CR4","unstructured":"Bai, W., Blocki, J.: Dahash: Distribution aware tuning of password hashing costs (2021). https:\/\/arxiv.org\/abs\/2101.10374"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 292\u2013302. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.31"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Blocki, J., Datta, A.: CASH: a cost asymmetric secure hash algorithm for optimal password protection. In: IEEE 29th Computer Security Foundations Symposium, pp. 371\u2013386 (2016)","DOI":"10.1109\/CSF.2016.33"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Blocki, J., Datta, A., Bonneau, J.: Differentially private password frequency lists. In: NDSS 2016, San Diego, CA, USA. The Internet Society, 21\u201324 February 2016","DOI":"10.14722\/ndss.2016.23328"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Blocki, J., Harsha, B., Zhou, S.: On the economics of offline password cracking. In: 2018 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 853\u2013871. IEEE Computer Society Press, 21\u201323 May 2018. https:\/\/doi.org\/10.1109\/SP.2018.00009","DOI":"10.1109\/SP.2018.00009"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, pp. 538\u2013552. IEEE Computer Society Press, 21\u201323 May 2012. https:\/\/doi.org\/10.1109\/SP.2012.49","DOI":"10.1109\/SP.2012.49"},{"key":"20_CR10","unstructured":"Boyen, X.: Halting password puzzles: hard-to-break encryption from human-memorable keys. In: Provos, N. (ed.) USENIX Security 2007, pp. 6\u201310, Boston, MA, USA. USENIX Association, August 2007"},{"key":"20_CR11","unstructured":"Castelluccia, C., Chaabane, A., D\u00fcrmuth, M., Perito, D.: When privacy meets security: Leveraging personal information for password cracking. arXiv preprint arXiv:1304.6584 (2013)"},{"key":"20_CR12","unstructured":"Castelluccia, C., D\u00fcrmuth, M., Perito, D.: Adaptive password-strength meters from Markov models. In: NDSS 2012, San Diego, CA, USA, The Internet Society, 5\u20138 February 2012"},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Dell\u2019Amico, M., Filippone, M.: Monte Carlo strength evaluation: fast and reliable password checking. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015, Denver, CO, USA, pp. 158\u2013169. ACM Press, 12\u201316 October 2015. https:\/\/doi.org\/10.1145\/2810103.2813631","DOI":"10.1145\/2810103.2813631"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-319-56614-6_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"Y Dodis","year":"2017","unstructured":"Dodis, Y., Guo, S., Katz, J.: Fixing cracks in the concrete: random oracles with auxiliary input, revisited. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 473\u2013495. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_16"},{"key":"20_CR15","unstructured":"Fossi, M., et al.: Symantec report on the underground economy, November 2008. Accessed 1 August 2013"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Harsha, B., Morton, R., Blocki, J., Springer, J., Dark, M.: Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage. Comput. Secur. 100, 102068 (2021)","DOI":"10.1016\/j.cose.2020.102068"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-1-4419-6967-5_3","volume-title":"Economics of Information Security and Privacy","author":"C Herley","year":"2010","unstructured":"Herley, C., Flor\u00eancio, D.: Nobody sells gold for the price of silver: dishonesty, uncertainty and the underground economy. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 33\u201353. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6967-5_3"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: Pkcs# 5: password-based cryptography specification version 2.0 (2000)","DOI":"10.17487\/rfc2898"},{"key":"20_CR19","doi-asserted-by":"publisher","unstructured":"Kelley, P.G., et al.: Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In: 2012 IEEE Symposium on Security and Privacy, pp. 523\u2013537. IEEE Computer Society Press, San Francisco, CA, USA, 21\u201323 May 2012. https:\/\/doi.org\/10.1109\/SP.2012.38","DOI":"10.1109\/SP.2012.38"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Ma, J., Yang, W., Luo, M., Li, N.: A study of probabilistic password models. In: 2014 IEEE Symposium on Security and Privacy, pp. 689\u2013704. IEEE Computer Society Press, Berkeley, CA, USA, 18\u201321 May 2014. https:\/\/doi.org\/10.1109\/SP.2014.50","DOI":"10.1109\/SP.2014.50"},{"issue":"2","key":"20_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0167-4048(96)00003-X","volume":"15","author":"U Manber","year":"1996","unstructured":"Manber, U.: A simple scheme to make passwords based on one-way functions much harder to crack. Comput. Secur. 15(2), 171\u2013176 (1996)","journal-title":"Comput. Secur."},{"key":"20_CR22","unstructured":"Melicher, W., et al.: Fast, lean, and accurate: Modeling password guessability using neural networks. In: Holz, T., Savage, S. (eds.) USENIX Security 2016, Austin, TX, USA, pp. 175\u2013191. USENIX Association, 10\u201312 August 2016"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594\u2013597 (1979). http:\/\/dl.acm.org\/citation.cfm?id=359172","DOI":"10.1145\/359168.359172"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617\u2013630. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_36"},{"key":"20_CR25","unstructured":"Percival, C.: Stronger key derivation via sequential memory-hard functions. In: BSDCan 2009 (2009)"},{"key":"20_CR26","unstructured":"Provos, N., Mazieres, D.: Bcrypt algorithm. In: USENIX (1999)"},{"issue":"3","key":"20_CR27","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10898-012-9951-y","volume":"56","author":"LM Rios","year":"2013","unstructured":"Rios, L.M., Sahinidis, N.V.: Derivative-free optimization: a review of algorithms and comparison of software implementations. J. Global Optim. 56(3), 1247\u20131293 (2013)","journal-title":"J. Global Optim."},{"key":"20_CR28","unstructured":"Stockley, M.: What your hacked account is worth on the dark web, August 2016. https:\/\/nakedsecurity.sophos.com\/2016\/08\/09\/what-your-hacked-account-is-worth-on-the-dark-web\/"},{"key":"20_CR29","unstructured":"Ur, B., et al.: Measuring real-world accuracies and biases in modeling password guessability. In: Jung, J., Holz, T. (eds.) USENIX Security 2015. pp. 463\u2013481. USENIX Association, Washington, DC, USA, 12\u201314 August 2015"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-662-54970-4_36","volume-title":"Financial Cryptography and Data Security","author":"M Vasek","year":"2017","unstructured":"Vasek, M., Bonneau, J., Castellucci, R., Keith, C., Moore, T.: The bitcoin brain drain: examining the use and abuse of bitcoin brain wallets. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 609\u2013618. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_36"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Veras, R., Collins, C., Thorpe, J.: On semantic patterns of passwords and their security impact. In: NDSS 2014. The Internet Society, San Diego, CA, USA, 23\u201326 February 2014","DOI":"10.14722\/ndss.2014.23103"},{"key":"20_CR32","doi-asserted-by":"publisher","unstructured":"Von Stackelberg, H.: Market Structure and Equilibrium. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12586-7","DOI":"10.1007\/978-3-642-12586-7"},{"key":"20_CR33","doi-asserted-by":"publisher","unstructured":"Weir, M., Aggarwal, S., de Medeiros, B., Glodek, B.: Password cracking using probabilistic context-free grammars. In: 2009 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 391\u2013405. IEEE Computer Society Press, 17\u201320 May 2009. https:\/\/doi.org\/10.1109\/SP.2009.8","DOI":"10.1109\/SP.2009.8"},{"key":"20_CR34","unstructured":"Wetzels, J.: Open sesame: The password hashing competition and Argon2. Cryptology ePrint Archive, Report 2016\/104 (2016), http:\/\/eprint.iacr.org\/2016\/104"},{"issue":"2","key":"20_CR35","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00145-003-0213-5","volume":"17","author":"MJ Wiener","year":"2003","unstructured":"Wiener, M.J.: The Full Cost of Cryptanalytic Attacks. Journal of Cryptology 17(2), 105\u2013124 (2003). https:\/\/doi.org\/10.1007\/s00145-003-0213-5","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:09:03Z","timestamp":1634933343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}