{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:51:50Z","timestamp":1764402710446,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Brazilian National Counsel of Technological and Scientific Development","doi-asserted-by":"publisher","award":["473916\/2013-4","305350\/2013-7","306935\/2012-0)"],"award-info":[{"award-number":["473916\/2013-4","305350\/2013-7","306935\/2012-0)"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"S\u00e3o Paulo Research Foundation","doi-asserted-by":"publisher","award":["2011\/21592-8"],"award-info":[{"award-number":["2011\/21592-8"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Brazilian Coordination for the Improvement of Higher Education Personnel","doi-asserted-by":"publisher","award":["79414400249"],"award-info":[{"award-number":["79414400249"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tc.2016.2516011","type":"journal-article","created":{"date-parts":[[2016,1,8]],"date-time":"2016-01-08T19:28:14Z","timestamp":1452281294000},"page":"3096-3108","source":"Crossref","is-referenced-by-count":17,"title":["Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs"],"prefix":"10.1109","volume":"65","author":[{"given":"Ewerton R.","family":"Andrade","sequence":"first","affiliation":[]},{"given":"Marcos A.","family":"Simplicio","sequence":"additional","affiliation":[]},{"given":"Paulo S.L.M.","family":"Barreto","sequence":"additional","affiliation":[]},{"given":"Paulo C.F. dos","family":"Santos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"yescrypt - a Password Hashing Competition Submission","year":"2014","author":"peslyak","key":"ref39"},{"year":"2014","author":"broz","key":"ref38"},{"year":"2013","author":"forler","key":"ref33"},{"key":"ref32","first-page":"26","article-title":"Using deception to hide things from hackers: Processes, principles, and techniques","volume":"5","author":"yuill","year":"2006","journal-title":"J Info Warfare"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2381913.2381917"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"year":"2005","author":"bernstein","key":"ref35"},{"article-title":"Tradeoff cryptanalysis of password hashing schemes","year":"2014","author":"khovratovich","key":"ref34"},{"key":"ref10","first-page":"32","article-title":"A future-adaptable password scheme","author":"provos","year":"0","journal-title":"Proc Annu Conf USENIX Ann Tech Conf"},{"year":"2014","key":"ref40"},{"year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0063-5"},{"year":"0","author":"bertoni","key":"ref13"},{"year":"2011","author":"bertoni","key":"ref14"},{"article-title":"GPU-based password cracking: On the security of password hashing schemes regarding advances in graphics processing units","year":"2011","author":"sprengers","key":"ref15"},{"year":"2015","key":"ref16"},{"year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2203093"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17619-7_10"},{"journal-title":"PKCS#5 Password-Based Cryptography Specification v2 0 (RFC 2898)","year":"2000","author":"kaliski","key":"ref4"},{"year":"2009","author":"ji","key":"ref27"},{"key":"ref3","first-page":"1","article-title":"Stronger key derivation via sequential memory-hard functions","author":"percival","year":"0","journal-title":"Proc Technical BSD Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"ref29","first-page":"402","volume":"8366","author":"guo","year":"0","journal-title":"Proc Cryptographers' Track RSA Conf Topics Cryptology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_41"},{"journal-title":"SP 800-63-2 &#x2013; Electronic Authentication Guideline","year":"2013","key":"ref7"},{"journal-title":"SP 800-18 &#x2013; Recommendation for Key Derivation Using Pseudorandom Functions","year":"2009","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0064-y"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.216"},{"year":"2011","author":"bertoni","key":"ref20"},{"journal-title":"Nature","year":"2012","author":"crew","key":"ref45"},{"year":"2013","author":"aumasson","key":"ref22"},{"year":"2012","author":"gaj","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7896"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/800125.804032"},{"year":"2010","author":"aumasson","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_19"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2010.195"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13858-4_18"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7560676\/07377075.pdf?arnumber=7377075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:56Z","timestamp":1642004456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7377075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":45,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tc.2016.2516011","relation":{},"ISSN":["0018-9340"],"issn-type":[{"type":"print","value":"0018-9340"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}