1. Generation of secure and reliable honeywords, preventing false detection;Akshima;IEEE Trans. Depend. Secure Comput,2018
2. Tradeoff cryptanalysis of memory-hard functions;Biryukov,2015
3. CASH: A cost asymmetric secure hash algorithm for optimal password protection;Blocki,2016
4. Kamouflage: Loss-resistant password management;Bojinov,2010
5. The science of guessing: Analyzing an anonymized corpus of 70 million passwords;Bonneau,2012