gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated (c6639f8 -> cd31c69)


From: gnunet
Subject: [taler-anastasis] branch master updated (c6639f8 -> cd31c69)
Date: Wed, 03 Jun 2020 17:55:35 +0200

This is an automated email from the git hooks/post-receive script.

dennis-neufeld pushed a change to branch master
in repository anastasis.

    from c6639f8  fixed some images ack draft
     new 0d57648  modified related work
     new 9d85d00  merge
     new cd31c69  merge

The 3 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 .gitignore                    |    6 +
 doc/thesis/bibliothek.bib     |   14 +-
 doc/thesis/related_work.tex   |   27 +-
 doc/thesis/thesis.bbl         | 1080 +++++++++++++++++++++++++++++++++++++++++
 doc/thesis/thesis.blg         |   19 +
 doc/thesis/thesis.lof         |   15 +
 doc/thesis/thesis.lot         |    3 +
 NEWS => doc/thesis/thesis.out |    0
 doc/thesis/thesis.synctex.gz  |  Bin 0 -> 355649 bytes
 9 files changed, 1153 insertions(+), 11 deletions(-)
 create mode 100644 doc/thesis/thesis.bbl
 create mode 100644 doc/thesis/thesis.blg
 create mode 100644 doc/thesis/thesis.lof
 create mode 100644 doc/thesis/thesis.lot
 copy NEWS => doc/thesis/thesis.out (100%)
 create mode 100644 doc/thesis/thesis.synctex.gz

diff --git a/.gitignore b/.gitignore
index 0364a3f..94ea221 100644
--- a/.gitignore
+++ b/.gitignore
@@ -100,3 +100,9 @@ src/cli/.libs/
 src/cli/.libs/anastasis-assembler
 src/cli/.libs/anastasis-splitter
 
+doc/thesis/*.aux
+doc/thesis/*.bcf
+doc/thesis/*.log
+doc/thesis/*.run.xml
+doc/thesis/*.toc
+doc/thesis/*.pdf
\ No newline at end of file
diff --git a/doc/thesis/bibliothek.bib b/doc/thesis/bibliothek.bib
index 4edca42..b06dcd7 100644
--- a/doc/thesis/bibliothek.bib
+++ b/doc/thesis/bibliothek.bib
@@ -295,5 +295,17 @@
   year={2004},
   publisher={IEEE}
 }
-
+@inproceedings{MBSS2013,
+  title={SMS-based one-time passwords: attacks and defense},
+  author={Mulliner, Collin and Borgaonkar, Ravishankar and Stewin, Patrick and 
Seifert, Jean-Pierre},
+  booktitle={International Conference on Detection of Intrusions and Malware, 
and Vulnerability Assessment},
+  pages={150--159},
+  year={2013},
+  organization={Springer}
+}
+@article{pohlmann2017,
+  title={Wenn der Softbot menschliche Identit{\"a}t best{\"a}tigt. 
Videoident-Verfahren II: Die Technik},
+  author={Pohlmann, Norbert and Frintrop, Jan-Hendrik and Widdermann, Rick and 
Ziegler, Tim},
+  year={2017}
+}
 
diff --git a/doc/thesis/related_work.tex b/doc/thesis/related_work.tex
index 86fbf2d..668de6a 100644
--- a/doc/thesis/related_work.tex
+++ b/doc/thesis/related_work.tex
@@ -76,7 +76,7 @@ The security of MIDATA as described in "Patient empowerment 
in IoT for eHealth -
 
 
 \subsection{Authentication}
-To build a secure authentication procedure, today multi-factor authentication 
is the standard \cite{multifactor_authentication}. A single authentication 
method by itself is usually highly vulnerable. But multi-factor authentication 
combines multiple authentication procedures to enhance the security of the 
system. \\ 
+To build a secure authentication procedure, today multi-factor authentication 
is the standard \cite{multifactor_authentication}. A single authentication 
method by itself is usually vulnerable. But multi-factor authentication 
combines multiple authentication procedures to enhance the security of the 
system. \\ 
 Anastasis is designed to use a wide range of authentication methods to 
authenticate its users. Even though the user in Anastasis is free to specify 
only one authentication method, we strongly recommend the use of multi-factor 
authentication. A short overview of the possible methods is presented here.
 
 \subsubsection{Password authentication}
@@ -94,24 +94,31 @@ There are several ways to implement authentication via a 
secure question:
 The first option is the easiest one. But predefining the answers has the 
disadvantage being very impersonal and inflexible. The questions must 
inevitably be very general, which allows an attacker to answer the questions 
without even having to guess. Therefore the first option is not applicable.\\
 The second option is more applicable but has some drawbacks, too. For example 
there may be questions whose answers have multiple syntactic representations 
(for example, "St." versus "Street") \cite{just2004}. Another problem could be 
a question whose answer may change over time. Asking for the favourite actor 
for example could be problematic. In addition, there is a challenge to define 
questions for all kind of people. Some people for example could not answer to 
the question, what the na [...]
 In case of the third option we also have the problematic of the second one. 
Furthermore there is the difficulty for the user to ask creative questions. A 
good question should only be answerable by the user. Also, it would be perfect 
to have the attacker on the wrong track by using ambiguities he doesn't know.\\
-FIXME: privacy concerns (personal answers must be stored)
-
+Authentication using a secure question needs personal information stored at 
the server which is critical in terms of privacy. That is why Anastasis doesn't 
store the answers of secure questions in clear text. Instead, we only store the 
hash value of an answer. Thus the user only has to provide the hash value of 
the answer and does not have to disclose any personal information.
 
 \subsubsection{SMS authentication}
-Another way to authenticate is SMS authentication. The most popular use case 
is the mobile TAN used to authorize online banking transactions. But SMS is no 
longer considered secure. The SMS authentication relies on the security of the 
mobile network, which has different possible attacks \cite{rieck_detection}. 
There are also specialized mobile Trojans which are used to eavesdrop these 
messages directly on the mobile device.\\
+Another way to authenticate is SMS authentication. The most popular use case 
is the so called Mobile TAN used to authorize online banking transactions. A 
Mobile TAN is an SMS based One-Time Password (OTP), short SMS OTP. SMS OTPs 
"were introduced to counter phishing and other attacks against authentication 
and authorization of Internet services" \cite{MBSS2013}.  But SMS is no longer 
considered secure. The SMS authentication relies on the security of the mobile 
network, which has differe [...]
 When it comes to privacy, storing a phone number is a problem. But the service 
authenticating the user needs the phone number enabling it to send a message to 
the user during authentication process.\\
 In Anastasis we also need to store the phone number to the server. But in our 
case the phone number is encrypted with a secret key only the user owns. The 
server only gets this secret key during an authentication process. Thus 
stealing the database of the server does not reveal the phone number to the 
attacker.
 
-FIXME
-Instead of using SMS one can also use other forms of messages such as email or 
physical mail. They all face the threat of interception. FIXME
+\subsubsection{E-mail authentication}
+Authentication by e-mail is very similar to SMS authentication. Here, the user 
receives an OTP by e-mail and has to provide it during authentication process.\\
+
+FIXME: drawbacks,vulnerability\\
+In Anastasis the mail address of the user is stored in an encrypted way, too. 
The user has to provide the corresponding key to the server during 
authentication process.
 
-\subsubsection{Mail authentication}
 
-\subsubsection{Videoindent}
+\subsubsection{VideoIdent}
+VideoIdent uses a video chat to verify the identity of a user. The user needs 
to show his face using a camera to an employee of the VideoIdent-service who 
verifies the correct user by a picture of the user \cite{pohlmann2017}.\\
+Prerequisites for error-free identification are a video camera with good video 
quality and a high-resolution image of the user on which the face can be seen 
very clearly. The user should also not change his outward appearance too much 
over time. A thick beard could also lead to the VideoIdent-service employee not 
being able to recognise the user correctly.\\
+For an attacker who looks very similar to the user, there is a high chance 
that the employee incorrectly confirms the identification. Therefor some 
interaction of the user is needed like for example telling the employee a short 
code which has been sent right before to the user by mail.\\
+In Anastasis the picture of the user is stored in an encrypted way. During 
authentication process the user has to provide the correct key for decryption 
to the server which provides the picture to the VideoIdent-service.
 
-\subsubsection{Postident}
+\subsubsection{PostIdent}
+It is also possible to sent a verification code to the user by physical mail. 
Of course this authentication method takes some time and there is the 
possibility the physical mail gets intercepted or lost during transmission.\\
+Anastasis does not store the address of the user in clear text. Instead the 
address is encrypted before storing and the server gets to know the address 
only during authentication process of the user.
 
 \subsubsection{Biometric authentication}
-Another way of authenticating is the biometric approach \cite{biometric_auth}. 
Biometric authentication is based on "something you are", like your iris or 
your fingerprint. There are also threats against biometric authentication. 
There are documented attacks against fingerprint and iris scan authentication. 
For example, a member of the German CCC e.V. was able to generate replicas from 
Angela Merkel's iris and Ursula von der Leyen's fingerprint \cite{ccc_merkel}. 
+Another way of authenticating is the biometric approach \cite{biometric_auth}. 
Biometric authentication is based on "something you are", like your iris or 
your fingerprint. There are also threats against biometric authentication. 
There are documented attacks against fingerprint and iris scan authentication. 
For example, a member of the German CCC e.V. was able to generate replicas from 
Angela Merkel's iris and Ursula von der Leyen's fingerprint \cite{ccc_merkel}.
 
 
diff --git a/doc/thesis/thesis.bbl b/doc/thesis/thesis.bbl
new file mode 100644
index 0000000..2f233c0
--- /dev/null
+++ b/doc/thesis/thesis.bbl
@@ -0,0 +1,1080 @@
+% $ biblatex auxiliary file $
+% $ biblatex bbl format version 3.1 $
+% Do not modify the above lines!
+%
+% This is an auxiliary file used by the 'biblatex' package.
+% This file may safely be deleted. It will be recreated by
+% biber as required.
+%
+\begingroup
+\makeatletter
+\@ifundefined{ver@biblatex.sty}
+  {\@latex@error
+     {Missing 'biblatex' package}
+     {The bibliography requires the 'biblatex' package.}
+      \aftergroup\endinput}
+  {}
+\endgroup
+
+
+\refsection{0}
+  \datalist[entry]{none/global//global/global}
+    \entry{vadhan2012}{article}{}
+      \true{moreauthor}
+      \true{morelabelname}
+      \name{author}{1}{}{%
+        {{hash=4a7848d2e829c08c64fd0693e3389940}{%
+           family={Vadhan},
+           familyi={V\bibinitperiod},
+           given={Salil\bibnamedelima P},
+           giveni={S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Now Publishers, Inc.}%
+      }
+      \strng{namehash}{abb7f98446293f740b141f01ff61554d}
+      \strng{fullhash}{abb7f98446293f740b141f01ff61554d}
+      \strng{bibnamehash}{abb7f98446293f740b141f01ff61554d}
+      \strng{authorbibnamehash}{abb7f98446293f740b141f01ff61554d}
+      \strng{authornamehash}{abb7f98446293f740b141f01ff61554d}
+      \strng{authorfullhash}{abb7f98446293f740b141f01ff61554d}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Foundations and Trends{®} in Theoretical Computer 
Science}
+      \field{number}{1--3}
+      \field{title}{Pseudorandomness}
+      \field{volume}{7}
+      \field{year}{2012}
+      \field{pages}{1\bibrangedash 336}
+      \range{pages}{336}
+    \endentry
+    \entry{nielsen2002}{inproceedings}{}
+      \name{author}{1}{}{%
+        {{hash=6535189281ff6a1012638e384823f5cf}{%
+           family={Nielsen},
+           familyi={N\bibinitperiod},
+           given={Jesper\bibnamedelima Buus},
+           giveni={J\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{6535189281ff6a1012638e384823f5cf}
+      \strng{fullhash}{6535189281ff6a1012638e384823f5cf}
+      \strng{bibnamehash}{6535189281ff6a1012638e384823f5cf}
+      \strng{authorbibnamehash}{6535189281ff6a1012638e384823f5cf}
+      \strng{authornamehash}{6535189281ff6a1012638e384823f5cf}
+      \strng{authorfullhash}{6535189281ff6a1012638e384823f5cf}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{Annual International Cryptology Conference}
+      \field{title}{A threshold pseudorandom function construction and its 
applications}
+      \field{year}{2002}
+      \field{pages}{401\bibrangedash 416}
+      \range{pages}{16}
+    \endentry
+    \entry{GGM1986}{article}{}
+      \name{author}{3}{}{%
+        {{hash=66aba379c7d3adb8af5b662a65c4c140}{%
+           family={Goldreich},
+           familyi={G\bibinitperiod},
+           given={Oded},
+           giveni={O\bibinitperiod}}}%
+        {{hash=39e4a0690915f1d991133196a545b37b}{%
+           family={Goldwasser},
+           familyi={G\bibinitperiod},
+           given={Shafi},
+           giveni={S\bibinitperiod}}}%
+        {{hash=fb54c363f1b0d126e883c84df49e4790}{%
+           family={Micali},
+           familyi={M\bibinitperiod},
+           given={Silvio},
+           giveni={S\bibinitperiod}}}%
+      }
+      \list{location}{1}{%
+        {New York, NY, USA}%
+      }
+      \list{publisher}{1}{%
+        {Association for Computing Machinery}%
+      }
+      \strng{namehash}{39e304099b960365cdb56b83f4c70df6}
+      \strng{fullhash}{39e304099b960365cdb56b83f4c70df6}
+      \strng{bibnamehash}{39e304099b960365cdb56b83f4c70df6}
+      \strng{authorbibnamehash}{39e304099b960365cdb56b83f4c70df6}
+      \strng{authornamehash}{39e304099b960365cdb56b83f4c70df6}
+      \strng{authorfullhash}{39e304099b960365cdb56b83f4c70df6}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{issn}{0004-5411}
+      \field{journaltitle}{J. ACM}
+      \field{month}{8}
+      \field{number}{4}
+      \field{title}{How to Construct Random Functions}
+      \field{volume}{33}
+      \field{year}{1986}
+      \field{pages}{792\bibrangedash 807}
+      \range{pages}{16}
+      \verb{doi}
+      \verb 10.1145/6490.6503
+      \endverb
+      \verb{urlraw}
+      \verb https://doi.org/10.1145/6490.6503
+      \endverb
+      \verb{url}
+      \verb https://doi.org/10.1145/6490.6503
+      \endverb
+    \endentry
+    \entry{Preneel1999}{inbook}{}
+      \name{author}{1}{}{%
+        {{hash=0b9d4896fca22178c881b5236f351e05}{%
+           family={Preneel},
+           familyi={P\bibinitperiod},
+           given={Bart},
+           giveni={B\bibinitperiod}}}%
+      }
+      \name{editor}{1}{}{%
+        {{hash=14f9bdb855aa40873ff3dce506ed6fff}{%
+           family={Damg{å}rd},
+           familyi={D\bibinitperiod},
+           given={Ivan\bibnamedelima Bjerre},
+           giveni={I\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+      }
+      \list{location}{1}{%
+        {Berlin, Heidelberg}%
+      }
+      \list{publisher}{1}{%
+        {Springer Berlin Heidelberg}%
+      }
+      \strng{namehash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{fullhash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{bibnamehash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{authorbibnamehash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{authornamehash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{authorfullhash}{0b9d4896fca22178c881b5236f351e05}
+      \strng{editorbibnamehash}{14f9bdb855aa40873ff3dce506ed6fff}
+      \strng{editornamehash}{14f9bdb855aa40873ff3dce506ed6fff}
+      \strng{editorfullhash}{14f9bdb855aa40873ff3dce506ed6fff}
+      \field{sortinit}{5}
+      \field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{abstract}{This paper describes the state of the art for 
cryptographic hash functions. Different definitions are compared, and the few 
theoretical results on hash functions are discussed. A brief overview is 
presented of the most important constructions, and some open problems are 
presented.}
+      \field{booktitle}{Lectures on Data Security: Modern Cryptology in Theory 
and Practice}
+      \field{isbn}{978-3-540-48969-6}
+      \field{title}{The State of Cryptographic Hash Functions}
+      \field{year}{1999}
+      \field{pages}{158}
+      \range{pages}{1}
+      \verb{doi}
+      \verb 10.1007/3-540-48969-X_8
+      \endverb
+      \verb{urlraw}
+      \verb https://doi.org/10.1007/3-540-48969-X_8
+      \endverb
+      \verb{url}
+      \verb https://doi.org/10.1007/3-540-48969-X_8
+      \endverb
+    \endentry
+    \entry{SG2012}{article}{}
+      \name{author}{2}{}{%
+        {{hash=831a194fddb2f27c4e2c482b1f72f48a}{%
+           family={Sobti},
+           familyi={S\bibinitperiod},
+           given={Rajeev},
+           giveni={R\bibinitperiod}}}%
+        {{hash=c244900d83a048c38628604327a28052}{%
+           family={Geetha},
+           familyi={G\bibinitperiod},
+           given={G},
+           giveni={G\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {International Journal of Computer Science Issues (IJCSI)}%
+      }
+      \strng{namehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \strng{fullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \strng{bibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \strng{authorbibnamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \strng{authornamehash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \strng{authorfullhash}{4d5e3f9d17e0c0b2294603b963e91c33}
+      \field{sortinit}{6}
+      \field{sortinithash}{7851c86048328b027313775d8fbd2131}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{International Journal of Computer Science Issues 
(IJCSI)}
+      \field{number}{2}
+      \field{title}{Cryptographic hash functions: a review}
+      \field{volume}{9}
+      \field{year}{2012}
+      \field{pages}{462}
+      \range{pages}{1}
+    \endentry
+    \entry{RK2011}{article}{}
+      \name{author}{2}{}{%
+        {{hash=8f939579bcf2d180bae9f53387cab62b}{%
+           family={Ramanujam},
+           familyi={R\bibinitperiod},
+           given={Sriram},
+           giveni={S\bibinitperiod}}}%
+        {{hash=81584ababc9dfe487baae50ab6f0ca8a}{%
+           family={Karuppiah},
+           familyi={K\bibinitperiod},
+           given={Marimuthu},
+           giveni={M\bibinitperiod}}}%
+      }
+      \strng{namehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \strng{fullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \strng{bibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \strng{authorbibnamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \strng{authornamehash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \strng{authorfullhash}{79ea2c47cb704d13b6d9bcf7c199fc51}
+      \field{sortinit}{9}
+      \field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{IJCSNS International Journal of Computer Science 
and Network Security}
+      \field{number}{1}
+      \field{title}{Designing an algorithm with high Avalanche Effect}
+      \field{volume}{11}
+      \field{year}{2011}
+      \field{pages}{106\bibrangedash 111}
+      \range{pages}{6}
+    \endentry
+    \entry{GJW2011}{inproceedings}{}
+      \name{author}{3}{}{%
+        {{hash=74ca2f05d1125811a4211361255b1cf2}{%
+           family={Gueron},
+           familyi={G\bibinitperiod},
+           given={Shay},
+           giveni={S\bibinitperiod}}}%
+        {{hash=38e00ab25a60509b785c20ef8caa89b9}{%
+           family={Johnson},
+           familyi={J\bibinitperiod},
+           given={Simon},
+           giveni={S\bibinitperiod}}}%
+        {{hash=20a47eef2fa55e0486b02a0e2a0b8d0c}{%
+           family={Walker},
+           familyi={W\bibinitperiod},
+           given={Jesse},
+           giveni={J\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {IEEE}%
+      }
+      \strng{namehash}{4b253103893adba3aada17995ac73ec0}
+      \strng{fullhash}{4b253103893adba3aada17995ac73ec0}
+      \strng{bibnamehash}{4b253103893adba3aada17995ac73ec0}
+      \strng{authorbibnamehash}{4b253103893adba3aada17995ac73ec0}
+      \strng{authornamehash}{4b253103893adba3aada17995ac73ec0}
+      \strng{authorfullhash}{4b253103893adba3aada17995ac73ec0}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{2011 Eighth International Conference on Information 
Technology: New Generations}
+      \field{title}{SHA-512/256}
+      \field{year}{2011}
+      \field{pages}{354\bibrangedash 358}
+      \range{pages}{5}
+    \endentry
+    \entry{BCK1996}{article}{}
+      \name{author}{3}{}{%
+        {{hash=06e2bb2f83d8b669b46db64431509301}{%
+           family={Bellare},
+           familyi={B\bibinitperiod},
+           given={Mihir},
+           giveni={M\bibinitperiod}}}%
+        {{hash=7faf0f3900af6c70795ea089d283f02e}{%
+           family={Canetti},
+           familyi={C\bibinitperiod},
+           given={Ran},
+           giveni={R\bibinitperiod}}}%
+        {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
+           family={Krawczyk},
+           familyi={K\bibinitperiod},
+           given={Hugo},
+           giveni={H\bibinitperiod}}}%
+      }
+      \strng{namehash}{2527ef0685da3bdb01959cd066adc238}
+      \strng{fullhash}{2527ef0685da3bdb01959cd066adc238}
+      \strng{bibnamehash}{2527ef0685da3bdb01959cd066adc238}
+      \strng{authorbibnamehash}{2527ef0685da3bdb01959cd066adc238}
+      \strng{authornamehash}{2527ef0685da3bdb01959cd066adc238}
+      \strng{authorfullhash}{2527ef0685da3bdb01959cd066adc238}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{RSA Laboratories’ CryptoBytes}
+      \field{number}{1}
+      \field{title}{Message authentication using hash functions: The HMAC 
construction}
+      \field{volume}{2}
+      \field{year}{1996}
+      \field{pages}{12\bibrangedash 15}
+      \range{pages}{4}
+    \endentry
+    \entry{krawczyk2010}{inproceedings}{}
+      \name{author}{1}{}{%
+        {{hash=088445b3855bedf4bcc9d25651eb98b2}{%
+           family={Krawczyk},
+           familyi={K\bibinitperiod},
+           given={Hugo},
+           giveni={H\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{088445b3855bedf4bcc9d25651eb98b2}
+      \strng{fullhash}{088445b3855bedf4bcc9d25651eb98b2}
+      \strng{bibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
+      \strng{authorbibnamehash}{088445b3855bedf4bcc9d25651eb98b2}
+      \strng{authornamehash}{088445b3855bedf4bcc9d25651eb98b2}
+      \strng{authorfullhash}{088445b3855bedf4bcc9d25651eb98b2}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{Annual Cryptology Conference}
+      \field{title}{Cryptographic extraction and key derivation: The HKDF 
scheme}
+      \field{year}{2010}
+      \field{pages}{631\bibrangedash 648}
+      \range{pages}{18}
+    \endentry
+    \entry{trimberger2012}{book}{}
+      \name{author}{1}{}{%
+        {{hash=0afd18d7b25d23c61db1fe942ec1c236}{%
+           family={Trimberger},
+           familyi={T\bibinitperiod},
+           given={Stephen\bibnamedelima M},
+           giveni={S\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Springer Science \& Business Media}%
+      }
+      \strng{namehash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \strng{fullhash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \strng{bibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \strng{authorbibnamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \strng{authornamehash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \strng{authorfullhash}{0afd18d7b25d23c61db1fe942ec1c236}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Field-programmable gate array technology}
+      \field{year}{2012}
+    \endentry
+    \entry{madurawe2006}{misc}{}
+      \name{author}{1}{}{%
+        {{hash=093f14ec763e8df6227fd18ac8958011}{%
+           family={Madurawe},
+           familyi={M\bibinitperiod},
+           given={Raminda\bibnamedelima Udaya},
+           giveni={R\bibinitperiod\bibinitdelim U\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Google Patents}%
+      }
+      \strng{namehash}{093f14ec763e8df6227fd18ac8958011}
+      \strng{fullhash}{093f14ec763e8df6227fd18ac8958011}
+      \strng{bibnamehash}{093f14ec763e8df6227fd18ac8958011}
+      \strng{authorbibnamehash}{093f14ec763e8df6227fd18ac8958011}
+      \strng{authornamehash}{093f14ec763e8df6227fd18ac8958011}
+      \strng{authorfullhash}{093f14ec763e8df6227fd18ac8958011}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{month}{6}
+      \field{note}{US Patent 7,064,579}
+      \field{title}{Alterable application specific integrated circuit (ASIC)}
+      \field{year}{2006}
+    \endentry
+    \entry{BDK2016}{inproceedings}{}
+      \name{author}{3}{}{%
+        {{hash=6b9702c0a225b2966f2e07631bcfe935}{%
+           family={Biryukov},
+           familyi={B\bibinitperiod},
+           given={Alex},
+           giveni={A\bibinitperiod}}}%
+        {{hash=bf937d804c107f19fafa536592af6563}{%
+           family={Dinu},
+           familyi={D\bibinitperiod},
+           given={Daniel},
+           giveni={D\bibinitperiod}}}%
+        {{hash=d38e18b5ec4018e5f12aab4287c4a08f}{%
+           family={Khovratovich},
+           familyi={K\bibinitperiod},
+           given={Dmitry},
+           giveni={D\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {IEEE}%
+      }
+      \strng{namehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \strng{fullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \strng{bibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \strng{authorbibnamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \strng{authornamehash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \strng{authorfullhash}{037d5c3d4e3ef2dcef34dc59a05beed9}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{2016 IEEE European Symposium on Security and Privacy 
(EuroS\&P)}
+      \field{title}{Argon2: new generation of memory-hard functions for 
password hashing and other applications}
+      \field{year}{2016}
+      \field{pages}{292\bibrangedash 302}
+      \range{pages}{11}
+    \endentry
+    \entry{stamp2003}{article}{}
+      \name{author}{1}{}{%
+        {{hash=799c6648cb97b6ffb4e9da11a6e277ac}{%
+           family={Stamp},
+           familyi={S\bibinitperiod},
+           given={Mark},
+           giveni={M\bibinitperiod}}}%
+      }
+      \strng{namehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \strng{fullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \strng{bibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \strng{authorbibnamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \strng{authornamehash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \strng{authorfullhash}{799c6648cb97b6ffb4e9da11a6e277ac}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{San Jose State University, Department of Computer 
Science}
+      \field{title}{Once upon a time-memory tradeoff}
+      \field{year}{2003}
+    \endentry
+    \entry{shamir_sharing}{article}{}
+      \name{author}{1}{}{%
+        {{hash=71b77dd8ab33fe646ef25cded49e9881}{%
+           family={Shamir},
+           familyi={S\bibinitperiod},
+           given={Adi},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {ACm New York, NY, USA}%
+      }
+      \strng{namehash}{71b77dd8ab33fe646ef25cded49e9881}
+      \strng{fullhash}{71b77dd8ab33fe646ef25cded49e9881}
+      \strng{bibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
+      \strng{authorbibnamehash}{71b77dd8ab33fe646ef25cded49e9881}
+      \strng{authornamehash}{71b77dd8ab33fe646ef25cded49e9881}
+      \strng{authorfullhash}{71b77dd8ab33fe646ef25cded49e9881}
+      \field{sortinit}{1}
+      \field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Communications of the ACM}
+      \field{number}{11}
+      \field{title}{How to share a secret}
+      \field{volume}{22}
+      \field{year}{1979}
+      \field{pages}{612\bibrangedash 613}
+      \range{pages}{2}
+    \endentry
+    \entry{pedersen_sharing_0}{inproceedings}{}
+      \name{author}{1}{}{%
+        {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
+           family={Pedersen},
+           familyi={P\bibinitperiod},
+           given={Torben\bibnamedelima Pryds},
+           giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \field{extraname}{1}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{Annual international cryptology conference}
+      \field{chapter}{0}
+      \field{title}{Non-interactive and information-theoretic secure 
verifiable secret sharing}
+      \field{year}{1991}
+      \field{pages}{129\bibrangedash 140}
+      \range{pages}{12}
+    \endentry
+    \entry{feldman_sharing}{inproceedings}{}
+      \name{author}{1}{}{%
+        {{hash=618e5892290641345f357d52e5ef3c12}{%
+           family={Feldman},
+           familyi={F\bibinitperiod},
+           given={Paul},
+           giveni={P\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {IEEE}%
+      }
+      \strng{namehash}{618e5892290641345f357d52e5ef3c12}
+      \strng{fullhash}{618e5892290641345f357d52e5ef3c12}
+      \strng{bibnamehash}{618e5892290641345f357d52e5ef3c12}
+      \strng{authorbibnamehash}{618e5892290641345f357d52e5ef3c12}
+      \strng{authornamehash}{618e5892290641345f357d52e5ef3c12}
+      \strng{authorfullhash}{618e5892290641345f357d52e5ef3c12}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{28th Annual Symposium on Foundations of Computer 
Science (sfcs 1987)}
+      \field{title}{A practical scheme for non-interactive verifiable secret 
sharing}
+      \field{year}{1987}
+      \field{pages}{427\bibrangedash 438}
+      \range{pages}{12}
+    \endentry
+    \entry{pedersen_sharing_5.2}{inproceedings}{}
+      \name{author}{1}{}{%
+        {{hash=ee278eaf10727ef21f15ba59cdfcb51b}{%
+           family={Pedersen},
+           familyi={P\bibinitperiod},
+           given={Torben\bibnamedelima Pryds},
+           giveni={T\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{fullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{bibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authorbibnamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authornamehash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \strng{authorfullhash}{ee278eaf10727ef21f15ba59cdfcb51b}
+      \field{extraname}{2}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{Annual international cryptology conference}
+      \field{chapter}{5.2}
+      \field{title}{Non-interactive and information-theoretic secure 
verifiable secret sharing}
+      \field{year}{1991}
+      \field{pages}{129\bibrangedash 140}
+      \range{pages}{12}
+    \endentry
+    \entry{midata}{book}{}
+      \name{author}{2}{}{%
+        {{hash=b41b32ea32d73cd352e35f15b7f0b82e}{%
+           family={Parag\bibnamedelima Chatterjee},
+           familyi={P\bibinitperiod\bibinitdelim C\bibinitperiod},
+           given={Emmanuel\bibnamedelima Benoist},
+           giveni={E\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
+        {{hash=8d46139dbcfb8d6e298d3be4bb2ad78b}{%
+           family={Nath},
+           familyi={N\bibinitperiod},
+           given={Asoke},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {IGI Global}%
+      }
+      \strng{namehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{fullhash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{bibnamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authorbibnamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authornamehash}{e366017de179e8187fd5bb233ad210d8}
+      \strng{authorfullhash}{e366017de179e8187fd5bb233ad210d8}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Applied Approach to Privacy and Security for the Internet 
of Things}
+      \field{year}{in print}
+    \endentry
+    \entry{multifactor_authentication}{article}{}
+      \name{author}{6}{}{%
+        {{hash=349f11e1663912dcb58a979614214591}{%
+           family={Ometov},
+           familyi={O\bibinitperiod},
+           given={Aleksandr},
+           giveni={A\bibinitperiod}}}%
+        {{hash=2210a791565f0e229e45ee4adddbe39a}{%
+           family={Bezzateev},
+           familyi={B\bibinitperiod},
+           given={Sergey},
+           giveni={S\bibinitperiod}}}%
+        {{hash=515fcf6ab2738bfda2f35fc8a7aabbad}{%
+           family={Makitalo},
+           familyi={M\bibinitperiod},
+           given={Niko},
+           giveni={N\bibinitperiod}}}%
+        {{hash=29e0c47c24b13223f7986b9dd3f37aeb}{%
+           family={Andreev},
+           familyi={A\bibinitperiod},
+           given={Sergey},
+           giveni={S\bibinitperiod}}}%
+        {{hash=5d7740b6e2ec0fb41f72f451e980670b}{%
+           family={Mikkonen},
+           familyi={M\bibinitperiod},
+           given={Tommi},
+           giveni={T\bibinitperiod}}}%
+        {{hash=1b1c95790f3403d472ac8a4befa0eb49}{%
+           family={Koucheryavy},
+           familyi={K\bibinitperiod},
+           given={Yevgeni},
+           giveni={Y\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Multidisciplinary Digital Publishing Institute}%
+      }
+      \strng{namehash}{45cd1a76e0cdd8946f91bead3b664768}
+      \strng{fullhash}{c1db872bc8ef36ee51e0526f23769166}
+      \strng{bibnamehash}{c1db872bc8ef36ee51e0526f23769166}
+      \strng{authorbibnamehash}{c1db872bc8ef36ee51e0526f23769166}
+      \strng{authornamehash}{45cd1a76e0cdd8946f91bead3b664768}
+      \strng{authorfullhash}{c1db872bc8ef36ee51e0526f23769166}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Cryptography}
+      \field{number}{1}
+      \field{title}{Multi-factor authentication: A survey}
+      \field{volume}{2}
+      \field{year}{2018}
+      \field{pages}{1}
+      \range{pages}{1}
+    \endentry
+    \entry{authentication_methods_review}{article}{}
+      \name{author}{4}{}{%
+        {{hash=7320eb44b90aead6870ac2fab7d71076}{%
+           family={Syed\bibnamedelima Idrus},
+           familyi={S\bibinitperiod\bibinitdelim I\bibinitperiod},
+           given={Syed\bibnamedelima Zulkarnain},
+           giveni={S\bibinitperiod\bibinitdelim Z\bibinitperiod}}}%
+        {{hash=a09a932af5f7cd55229eaae3115944ad}{%
+           family={Cherrier},
+           familyi={C\bibinitperiod},
+           given={Estelle},
+           giveni={E\bibinitperiod}}}%
+        {{hash=b91ea03eff7b52d366d5afa7847a6284}{%
+           family={Rosenberger},
+           familyi={R\bibinitperiod},
+           given={Christophe},
+           giveni={C\bibinitperiod}}}%
+        {{hash=315979ea9ce5ac9865a4cf0dae673cd0}{%
+           family={Schwartzmann},
+           familyi={S\bibinitperiod},
+           given={Jean-Jacques},
+           giveni={J\bibinithyphendelim J\bibinitperiod}}}%
+      }
+      \strng{namehash}{ce7e837cc1dbca8dddef9896de46176c}
+      \strng{fullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+      \strng{bibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+      \strng{authorbibnamehash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+      \strng{authornamehash}{ce7e837cc1dbca8dddef9896de46176c}
+      \strng{authorfullhash}{c7f2c123e1ed3b1e1ad986ca25e522b3}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Australian Journal of Basic and Applied Sciences}
+      \field{number}{5}
+      \field{title}{A Review on Authentication Methods}
+      \field{volume}{7}
+      \field{year}{2013}
+      \field{pages}{95\bibrangedash 107}
+      \range{pages}{13}
+      \verb{urlraw}
+      \verb https://hal.archives-ouvertes.fr/hal-00912435
+      \endverb
+      \verb{url}
+      \verb https://hal.archives-ouvertes.fr/hal-00912435
+      \endverb
+    \endentry
+    \entry{just2004}{article}{}
+      \name{author}{1}{}{%
+        {{hash=daa648a2c605762c09bfaab94d0f2168}{%
+           family={Just},
+           familyi={J\bibinitperiod},
+           given={Mike},
+           giveni={M\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {IEEE}%
+      }
+      \strng{namehash}{daa648a2c605762c09bfaab94d0f2168}
+      \strng{fullhash}{daa648a2c605762c09bfaab94d0f2168}
+      \strng{bibnamehash}{daa648a2c605762c09bfaab94d0f2168}
+      \strng{authorbibnamehash}{daa648a2c605762c09bfaab94d0f2168}
+      \strng{authornamehash}{daa648a2c605762c09bfaab94d0f2168}
+      \strng{authorfullhash}{daa648a2c605762c09bfaab94d0f2168}
+      \field{sortinit}{2}
+      \field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{IEEE Security \& Privacy}
+      \field{number}{5}
+      \field{title}{Designing and evaluating challenge-question systems}
+      \field{volume}{2}
+      \field{year}{2004}
+      \field{pages}{32\bibrangedash 39}
+      \range{pages}{8}
+    \endentry
+    \entry{MBSS2013}{inproceedings}{}
+      \name{author}{4}{}{%
+        {{hash=0c05d559d041112c87e63b05c5a7262b}{%
+           family={Mulliner},
+           familyi={M\bibinitperiod},
+           given={Collin},
+           giveni={C\bibinitperiod}}}%
+        {{hash=4e0292e00a4787b4db10b2dff39f4a1f}{%
+           family={Borgaonkar},
+           familyi={B\bibinitperiod},
+           given={Ravishankar},
+           giveni={R\bibinitperiod}}}%
+        {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
+           family={Stewin},
+           familyi={S\bibinitperiod},
+           given={Patrick},
+           giveni={P\bibinitperiod}}}%
+        {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
+           family={Seifert},
+           familyi={S\bibinitperiod},
+           given={Jean-Pierre},
+           giveni={J\bibinithyphendelim P\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{adce78e3f1e04476f35b2b5fcb6c6262}
+      \strng{fullhash}{85e8ef541ae3f71805b7382856006c85}
+      \strng{bibnamehash}{85e8ef541ae3f71805b7382856006c85}
+      \strng{authorbibnamehash}{85e8ef541ae3f71805b7382856006c85}
+      \strng{authornamehash}{adce78e3f1e04476f35b2b5fcb6c6262}
+      \strng{authorfullhash}{85e8ef541ae3f71805b7382856006c85}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{booktitle}{International Conference on Detection of Intrusions 
and Malware, and Vulnerability Assessment}
+      \field{title}{SMS-based one-time passwords: attacks and defense}
+      \field{year}{2013}
+      \field{pages}{150\bibrangedash 159}
+      \range{pages}{10}
+    \endentry
+    \entry{rieck_detection}{book}{}
+      \name{author}{3}{}{%
+        {{hash=47449209bde605e33642aeb4dcc23bf2}{%
+           family={Rieck},
+           familyi={R\bibinitperiod},
+           given={Konrad},
+           giveni={K\bibinitperiod}}}%
+        {{hash=1cda40a05e3c8aa2f5c29f19988ca758}{%
+           family={Stewin},
+           familyi={S\bibinitperiod},
+           given={Patrick},
+           giveni={P\bibinitperiod}}}%
+        {{hash=ed83c5ceed1edd0dbc3cc610adf79477}{%
+           family={Seifert},
+           familyi={S\bibinitperiod},
+           given={Jean-Pierre},
+           giveni={J\bibinithyphendelim P\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Springer}%
+      }
+      \strng{namehash}{5646590031d49807385b96f9f6caae4a}
+      \strng{fullhash}{5646590031d49807385b96f9f6caae4a}
+      \strng{bibnamehash}{5646590031d49807385b96f9f6caae4a}
+      \strng{authorbibnamehash}{5646590031d49807385b96f9f6caae4a}
+      \strng{authornamehash}{5646590031d49807385b96f9f6caae4a}
+      \strng{authorfullhash}{5646590031d49807385b96f9f6caae4a}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Detection of Intrusions and Malware, and Vulnerability 
Assessment: 10th International Conference, DIMVA 2013, Berlin, Germany, July 
18-19, 2013. Proceedings}
+      \field{volume}{7967}
+      \field{year}{2013}
+    \endentry
+    \entry{pohlmann2017}{article}{}
+      \name{author}{4}{}{%
+        {{hash=613966f471ac9240f4bfce66e6e27b3e}{%
+           family={Pohlmann},
+           familyi={P\bibinitperiod},
+           given={Norbert},
+           giveni={N\bibinitperiod}}}%
+        {{hash=6462a03ff4a69f0c01462ca9dfd9c2ac}{%
+           family={Frintrop},
+           familyi={F\bibinitperiod},
+           given={Jan-Hendrik},
+           giveni={J\bibinithyphendelim H\bibinitperiod}}}%
+        {{hash=247317f34ce75f08f273ab47d30a4e91}{%
+           family={Widdermann},
+           familyi={W\bibinitperiod},
+           given={Rick},
+           giveni={R\bibinitperiod}}}%
+        {{hash=197d288c2557c4675696cefb75461cf0}{%
+           family={Ziegler},
+           familyi={Z\bibinitperiod},
+           given={Tim},
+           giveni={T\bibinitperiod}}}%
+      }
+      \strng{namehash}{46fedf156ec86b72f1439a7e282b9fee}
+      \strng{fullhash}{7c1027a04280b6542245beeb85db1408}
+      \strng{bibnamehash}{7c1027a04280b6542245beeb85db1408}
+      \strng{authorbibnamehash}{7c1027a04280b6542245beeb85db1408}
+      \strng{authornamehash}{46fedf156ec86b72f1439a7e282b9fee}
+      \strng{authorfullhash}{7c1027a04280b6542245beeb85db1408}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Wenn der Softbot menschliche Identit{ä}t best{ä}tigt. 
Videoident-Verfahren II: Die Technik}
+      \field{year}{2017}
+    \endentry
+    \entry{biometric_auth}{article}{}
+      \name{author}{2}{}{%
+        {{hash=019f89587e0c1e896a94bec0898d3964}{%
+           family={Pagnin},
+           familyi={P\bibinitperiod},
+           given={Elena},
+           giveni={E\bibinitperiod}}}%
+        {{hash=3a3c8efa3b514b0608c70f90d96e7fec}{%
+           family={Mitrokotsa},
+           familyi={M\bibinitperiod},
+           given={Aikaterini},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{publisher}{1}{%
+        {Hindawi}%
+      }
+      \strng{namehash}{db53816ca2458e8344846c9aa5b3bce3}
+      \strng{fullhash}{db53816ca2458e8344846c9aa5b3bce3}
+      \strng{bibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
+      \strng{authorbibnamehash}{db53816ca2458e8344846c9aa5b3bce3}
+      \strng{authornamehash}{db53816ca2458e8344846c9aa5b3bce3}
+      \strng{authorfullhash}{db53816ca2458e8344846c9aa5b3bce3}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{journaltitle}{Security and Communication Networks}
+      \field{title}{Privacy-preserving biometric authentication: challenges 
and directions}
+      \field{volume}{2017}
+      \field{year}{2017}
+    \endentry
+    \entry{ccc_merkel}{online}{}
+      \name{author}{1}{}{%
+        {{hash=b7a2e18f77259e34d5b676fd04412bb3}{%
+           family={Krempl},
+           familyi={K\bibinitperiod},
+           given={Stefan},
+           giveni={S\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {heise online}%
+      }
+      \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{CCC-Tüftler hackt Merkels Iris und von der Leyens 
Fingerabdruck}
+      \field{urlday}{7}
+      \field{urlmonth}{3}
+      \field{urlyear}{2020}
+      \field{year}{2014}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
+      \endverb
+      \verb{url}
+      \verb 
https://www.heise.de/security/meldung/31C3-CCC-Tueftler-hackt-Merkels-Iris-und-von-der-Leyens-Fingerabdruck-2506929.html
+      \endverb
+    \endentry
+    \entry{gnu_taler}{online}{}
+      \list{organization}{1}{%
+        {Taler Systems SA}%
+      }
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labeltitlesource}{title}
+      \field{title}{GNU Taler: Features}
+      \field{urlday}{2}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://taler.net/en/features.html
+      \endverb
+      \verb{url}
+      \verb https://taler.net/en/features.html
+      \endverb
+    \endentry
+    \entry{postgresql}{online}{}
+      \list{organization}{1}{%
+        {The PostgreSQL Global Development Group}%
+      }
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labeltitlesource}{title}
+      \field{title}{PostgreSQL: The World's Most Advanced Open Source 
Relational Database}
+      \field{urlday}{2}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://www.postgresql.org/
+      \endverb
+      \verb{url}
+      \verb https://www.postgresql.org/
+      \endverb
+    \endentry
+    \entry{libcurl}{online}{}
+      \list{organization}{1}{%
+        {Curl}%
+      }
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labeltitlesource}{title}
+      \field{title}{libcurl - the multiprotocol file transfer library}
+      \field{urlday}{2}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://curl.haxx.se/libcurl/
+      \endverb
+      \verb{url}
+      \verb https://curl.haxx.se/libcurl/
+      \endverb
+    \endentry
+    \entry{libmicrohttpd}{online}{}
+      \list{organization}{1}{%
+        {GNU project}%
+      }
+      \field{sortinit}{3}
+      \field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
+      \field{labeltitlesource}{title}
+      \field{title}{GNU Libmicrohttpd}
+      \field{urlday}{2}
+      \field{urlmonth}{6}
+      \field{urlyear}{2020}
+      \field{year}{2020}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb https://www.gnu.org/software/libmicrohttpd/?
+      \endverb
+      \verb{url}
+      \verb https://www.gnu.org/software/libmicrohttpd/?
+      \endverb
+    \endentry
+    \entry{global_data_index}{online}{}
+      \list{organization}{1}{%
+        {Dell EMC.}%
+      }
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labeltitlesource}{title}
+      \field{title}{Global Data Protection Index 2018 – Key Findings}
+      \field{urlday}{7}
+      \field{urlmonth}{3}
+      \field{urlyear}{2020}
+      \field{year}{2018}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
+      \endverb
+      \verb{url}
+      \verb 
https://www.delltechnologies.com/content/dam/uwaem/production-design-assets/en/gdpi/assets/infographics/dell-gdpi-vb-key-findings-deck.pdf)
+      \endverb
+    \endentry
+    \entry{millions_lost}{online}{}
+      \name{author}{1}{}{%
+        {{hash=3648296958ad2ea0461fac7a13e12981}{%
+           family={Cuthbertson},
+           familyi={C\bibinitperiod},
+           given={Anthony},
+           giveni={A\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {INDEPENDENT}%
+      }
+      \strng{namehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{fullhash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{bibnamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authorbibnamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authornamehash}{3648296958ad2ea0461fac7a13e12981}
+      \strng{authorfullhash}{3648296958ad2ea0461fac7a13e12981}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{Bitcoin: Millions of dollars of cryptocurrency 'lost' 
after man dies with only password}
+      \field{urlday}{7}
+      \field{urlmonth}{3}
+      \field{urlyear}{2020}
+      \field{year}{2019}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+      \endverb
+      \verb{url}
+      \verb 
https://www.independent.co.uk/life-style/gadgets-and-tech/news/bitcoin-exchange-quadrigacx-password-cryptocurrency-scam-a8763676.html
+      \endverb
+    \endentry
+    \entry{forgot_my_pin}{online}{}
+      \name{author}{1}{}{%
+        {{hash=3690e6a925d190517dbba666878a6978}{%
+           family={Frauenfelder},
+           familyi={F\bibinitperiod},
+           given={Mark},
+           giveni={M\bibinitperiod}}}%
+      }
+      \list{organization}{1}{%
+        {WIRED}%
+      }
+      \strng{namehash}{3690e6a925d190517dbba666878a6978}
+      \strng{fullhash}{3690e6a925d190517dbba666878a6978}
+      \strng{bibnamehash}{3690e6a925d190517dbba666878a6978}
+      \strng{authorbibnamehash}{3690e6a925d190517dbba666878a6978}
+      \strng{authornamehash}{3690e6a925d190517dbba666878a6978}
+      \strng{authorfullhash}{3690e6a925d190517dbba666878a6978}
+      \field{sortinit}{4}
+      \field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
+      \field{labelnamesource}{author}
+      \field{labeltitlesource}{title}
+      \field{title}{I Forgot My PIN’: An Epic Tale of Losing \$30,000 in 
Bitcoin}
+      \field{urlday}{7}
+      \field{urlmonth}{3}
+      \field{urlyear}{2020}
+      \field{year}{2017}
+      \field{urldateera}{ce}
+      \verb{urlraw}
+      \verb 
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
+      \endverb
+      \verb{url}
+      \verb 
https://www.wired.com/story/i-forgot-my-pin-an-epic-tale-of-losing-dollar30000-in-bitcoin/
+      \endverb
+    \endentry
+  \enddatalist
+\endrefsection
+\endinput
+
diff --git a/doc/thesis/thesis.blg b/doc/thesis/thesis.blg
new file mode 100644
index 0000000..d691ca6
--- /dev/null
+++ b/doc/thesis/thesis.blg
@@ -0,0 +1,19 @@
+[0] Config.pm:304> INFO - This is Biber 2.13
+[0] Config.pm:307> INFO - Logfile is 'thesis.blg'
+[23] biber:315> INFO - === Mi Jun  3, 2020, 14:34:23
+[36] Biber.pm:375> INFO - Reading 'thesis.bcf'
+[95] Biber.pm:905> INFO - Found 33 citekeys in bib section 0
+[108] Biber.pm:4196> INFO - Processing section 0
+[108] Utils.pm:75> INFO - Globbing data source 'bibliothek.bib'
+[108] Utils.pm:91> INFO - Globbed data source 'bibliothek.bib' to 
bibliothek.bib
+[117] Biber.pm:4373> INFO - Looking for bibtex format file 'bibliothek.bib' 
for section 0
+[119] bibtex.pm:1462> INFO - LaTeX decoding ...
+[157] bibtex.pm:1281> INFO - Found BibTeX data source 'bibliothek.bib'
+[238] Utils.pm:300> WARN - year field 'in print' in entry 'midata' is not an 
integer - this will probably not sort properly.
+[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'variable = 
shifted' with 'variable = non-ignorable'
+[311] UCollate.pm:68> INFO - Overriding locale 'en-US' defaults 'normalization 
= NFD' with 'normalization = prenormalized'
+[311] Biber.pm:4024> INFO - Sorting list 'none/global//global/global' of type 
'entry' with template 'none' and locale 'en-US'
+[311] Biber.pm:4030> INFO - No sort tailoring available for locale 'en-US'
+[329] bbl.pm:648> INFO - Writing 'thesis.bbl' with encoding 'UTF-8'
+[345] bbl.pm:751> INFO - Output to thesis.bbl
+[345] Biber.pm:110> INFO - WARNINGS: 1
diff --git a/doc/thesis/thesis.lof b/doc/thesis/thesis.lof
new file mode 100644
index 0000000..981edd3
--- /dev/null
+++ b/doc/thesis/thesis.lof
@@ -0,0 +1,15 @@
+\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse 
{pagetracker}\boolfalse {backtracker}\relax 
+\defcounter {refsection}{0}\relax 
+\selectlanguage *{english}
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {1}{\ignorespaces System design 
overview}}{15}{figure.1}% 
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {2}{\ignorespaces Anastasis 
database}}{17}{figure.2}% 
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {3}{\ignorespaces Secret split 
process}}{24}{figure.3}% 
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {4}{\ignorespaces Secret split 
process}}{25}{figure.4}% 
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {5}{\ignorespaces Secret recovery 
process}}{26}{figure.5}% 
+\defcounter {refsection}{0}\relax 
+\contentsline {figure}{\numberline {6}{\ignorespaces Business project 
plan}}{37}{figure.6}% 
diff --git a/doc/thesis/thesis.lot b/doc/thesis/thesis.lot
new file mode 100644
index 0000000..1a53ee5
--- /dev/null
+++ b/doc/thesis/thesis.lot
@@ -0,0 +1,3 @@
+\boolfalse {citerequest}\boolfalse {citetracker}\boolfalse 
{pagetracker}\boolfalse {backtracker}\relax 
+\defcounter {refsection}{0}\relax 
+\selectlanguage *{english}
diff --git a/NEWS b/doc/thesis/thesis.out
similarity index 100%
copy from NEWS
copy to doc/thesis/thesis.out
diff --git a/doc/thesis/thesis.synctex.gz b/doc/thesis/thesis.synctex.gz
new file mode 100644
index 0000000..6a57e81
Binary files /dev/null and b/doc/thesis/thesis.synctex.gz differ

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]