{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:49:55Z","timestamp":1764402595622},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,1,4]],"date-time":"2014-01-04T00:00:00Z","timestamp":1388793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s13389-013-0063-5","type":"journal-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T13:26:24Z","timestamp":1388755584000},"page":"75-89","source":"Crossref","is-referenced-by-count":12,"title":["Lyra: password-based key derivation with tunable memory and processing costs"],"prefix":"10.1007","volume":"4","author":[{"given":"Leonardo C.","family":"Almeida","sequence":"first","affiliation":[]},{"given":"Ewerton R.","family":"Andrade","sequence":"additional","affiliation":[]},{"given":"Paulo S. L. M.","family":"Barreto","sequence":"additional","affiliation":[]},{"suffix":"Jr","given":"Marcos A.","family":"Simplicio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,4]]},"reference":[{"key":"63_CR1","first-page":"28","volume":"2011","author":"E Andreeva","year":"2011","unstructured":"Andreeva, E., Mennink, B., Preneel, B.: The Parazoa family: generalizing the Sponge hash functions. IACR Cryptol. ePrint Arch. 2011, 28 (2011)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"63_CR2","unstructured":"Apple: iOS security. Tech. rep., Apple Inc. (2012). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/images.apple.com\/ipad\/business\/docs\/iOS_Security_May12.pdf"},{"key":"63_CR3","doi-asserted-by":"publisher","unstructured":"Aumasson, J.P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of latin dances: Analysis of Salsa, ChaCha, and Rumba. In: Fast Software Encryption, vol. 5084, pp. 470\u2013488. Springer, Berlin (2008). doi:\n                    10.1007\/978-3-540-71039-4_30","DOI":"10.1007\/978-3-540-71039-4_30"},{"key":"63_CR4","unstructured":"Aumasson, J.P., Guo, J., Knellwolf, S., Matusiewicz, K., Meier, W.: Differential and invertibility properties of BLAKE. In: Fast Software Encryption, pp. 318\u2013332. Springer, New York (2010). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/eprint.iacr.org\/2010\/043.pdf"},{"key":"63_CR5","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Neves, S., Wilcox-OHearn, Z., Winnerlein, C.: BLAKE2: simpler, smaller, fast as MD5. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/blake2.net\/blake2_20130129.pdf\n                    \n                   (2013)","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"63_CR6","doi-asserted-by":"publisher","unstructured":"Bellare, M., Ristenpart, T., Tessaro, S.: Multi-instance security and its application to password-based cryptography. In: Advances in Cryptology (CRYPTO 2012), LNCS, vol. 7417, pp. 312\u2013329. Springer, Berlin (2012). doi:\n                    10.1007\/978-3-642-32009-19","DOI":"10.1007\/978-3-642-32009-19"},{"key":"63_CR7","doi-asserted-by":"publisher","unstructured":"Bernstein, D.: The Salsa20 family of stream ciphers. In: M. Robshaw, O. Billet (eds.) New Stream Cipher Designs, pp. 84\u201397. Springer, Berlin (2008). doi:\n                    10.1007\/978-3-540-68351-3_8","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"63_CR8","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Sponge functions (ECRYPT Hash Function Workshop 2007) (2007). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/csrc.nist.gov\/pki\/HashWorkshop\/Public_Comments\/2007_May.html"},{"key":"63_CR9","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Cryptographic sponge functions\u2014version 0.1. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/keccak.noekeon.org\/\n                    \n                   (2011)"},{"key":"63_CR10","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak SHA-3 submission. Submission to NIST (Round 3) (2011). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/keccak.noekeon.org\/Keccak-submission-3.pdf"},{"key":"63_CR11","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy, pp. 553\u2013567 (2012). doi:\n                    10.1109\/SP.2012.44","DOI":"10.1109\/SP.2012.44"},{"issue":"6","key":"63_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MC.2007.216","volume":"40","author":"S Chakrabarti","year":"2007","unstructured":"Chakrabarti, S., Singbal, M.: Password-based authentication: preventing dictionary attacks. Computer 40(6), 68\u201374 (2007). doi:\n                    10.1109\/MC.2007.216","journal-title":"Computer"},{"key":"63_CR13","unstructured":"Chang, S.J., Perlner, R., Burr, W.E., Turan, M.S., Kelsey, J.M., Paul, S., Bassham, L.E.: Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. US Department of Commerce, National Institute of Standards and Technology (2012). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/nvlpubs.nist.gov\/nistpubs\/ir\/2012\/NIST.IR.7896.pdf"},{"key":"63_CR14","doi-asserted-by":"publisher","unstructured":"Chung, E.S., Milder, P.A., Hoe, J.C., Mai, K.: Single-chip heterogeneous computing: Does the future include custom logic, FPGAs, and GPGPUs? In: Proc. of the 43rd Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO\u201943, pp. 225\u2013236. IEEE Computer Society, Washington, DC (2010). doi:\n                    10.1109\/MICRO.2010.36","DOI":"10.1109\/MICRO.2010.36"},{"key":"63_CR15","unstructured":"Conklin, A., Dietrich, G., Walz, D.: Password-based authentication: a system perspective. In: Proc. of the 37th Annual Hawaii International Conference on System Sciences (HICSS\u201904), HICSS\u201904, vol. 7, pp. 170\u2013179. IEEE Computer Society, Washington, DC (2004). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/dl.acm.org\/citation.cfm?id=962755.963150"},{"key":"63_CR16","doi-asserted-by":"publisher","unstructured":"Crew, B.: New carnivorous harp sponge discovered in deep sea. Nature (2012). doi:\n                    10.1038\/nature.2012.11789\n                    \n                  . \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.nature.com\/news\/new-carnivorous-harp-sponge-discovered-in-deep-sea-1.11789","DOI":"10.1038\/nature.2012.11789"},{"key":"63_CR17","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: A new MAC construction alred and a specific instance alpha-mac. In: Fast Software Encryption\u2014FSE\u201905, pp. 1\u201317 (2005). doi:\n                    10.1007\/11502760_1","DOI":"10.1007\/11502760_1"},{"issue":"3","key":"63_CR18","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1049\/iet-ifs.2010.0015","volume":"4","author":"J Daemen","year":"2010","unstructured":"Daemen, J., Rijmen, V.: Refinements of the alred construction and MAC security claims. Inf. Secur. IET 4(3), 149\u2013157 (2010). doi:\n                    10.1049\/iet-ifs\n                    \n                  . 2010.0015","journal-title":"Inf. Secur. IET"},{"key":"63_CR19","doi-asserted-by":"publisher","unstructured":"Dandass, Y.S.: Using FPGAs to parallelize dictionary attacks for password cracking. In: Proc. of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), pp. 485\u2013485. IEEE (2008). doi:\n                    10.1109\/HICSS.2008.484","DOI":"10.1109\/HICSS.2008.484"},{"key":"63_CR20","doi-asserted-by":"publisher","unstructured":"D\u00fcrmuth, M., G\u00fcneysu, T., Kasper, M.: Evaluation of standardized password-based key derivation against parallel processing platforms. In: Computer Security-ESORICS 2012, LNCS, vol. 7459, pp. 716\u2013733. Springer, Berlin (2012). doi:\n                    10.1007\/978-3-642-33167-1_41","DOI":"10.1007\/978-3-642-33167-1_41"},{"key":"63_CR21","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large scale study of web password habits. Proc. of the 16th International Conference on World Wide Web. Alberta, pp. 657\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"63_CR22","doi-asserted-by":"publisher","unstructured":"Fowers, J., Brown, G., Cooke, P., Stitt, G.: A performance and energy comparison of FPGAs, GPUs, and multicores for sliding-window applications. In: Proceedings of the ACM\/SIGDA Internbational Symposium on Field Programmable Gate Arrays (FPGA\u201912), pp. 47\u201356. ACM, New York (2012). doi:\n                    10.1145\/2145694.2145704","DOI":"10.1145\/2145694.2145704"},{"issue":"5","key":"63_CR23","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J Halderman","year":"2009","unstructured":"Halderman, J., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91\u201398 (2009). doi:\n                    10.1145\/1506409.1506429","journal-title":"Commun. ACM"},{"key":"63_CR24","doi-asserted-by":"publisher","unstructured":"Herley, C., van Oorschot, P., Patrick, A.: Passwords: If we\u2019re so smart, why are we still using them? In: Financial Cryptography and Data Security, LNCS, vol. 5628, pp. 230\u2013237. Springer, Berlin (2009). doi:\n                    10.1007\/978-3-642-03549-4_14","DOI":"10.1007\/978-3-642-03549-4_14"},{"issue":"2","key":"63_CR25","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s11227-006-5682-5","volume":"37","author":"AP Kakarountas","year":"2006","unstructured":"Kakarountas, A.P., Michail, H., Milidonis, A., Goutis, C.E., Theodoridis, G.: High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications. J. Supercomput. 37(2), 179\u2013195 (2006). doi:\n                    10.1007\/s11227-006-5682-5","journal-title":"J. Supercomput."},{"key":"63_CR26","unstructured":"Kaliski, B.: PKCS#5: Password-based cryptography specification version 2.0 (RFC 2898) (2000). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/tools.ietf.org\/html\/rfc2898"},{"key":"63_CR27","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure applications of low-entropy keys. In: Proceedings of the 1st International Workshop on Information Security, ISW \u201997, pp. 121\u2013134. Springer, London (1998)","DOI":"10.1007\/BFb0030415"},{"key":"63_CR28","unstructured":"Khronos Group: The OpenCL specification\u2014version 1.2 (2012)"},{"issue":"1","key":"63_CR29","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11416-007-0064-y","volume":"4","author":"M Marechal","year":"2008","unstructured":"Marechal, M.: Advances in password cracking. J. Comput. Virol. 4(1), 73\u201381 (2008). doi:\n                    10.1007\/s11416-007-0064-y","journal-title":"J. Comput. Virol."},{"key":"63_CR30","unstructured":"Ming, M., Qiang, H., Zeng, S.: Security analysis of BLAKE-32 based on differential properties. In: 2010 International Conference on Computational and Information Sciences (ICCIS), IEEE, pp. 783\u2013786 (2010). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=5709204"},{"key":"63_CR31","unstructured":"NIST: Federal Information Processing Standard (FIPS PUB 198)\u2014the Keyed-Hash Message Authentication Code. National Institute of Standards and Technology, U.S. Department of Commerce (2002). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/csrc.nist.gov\/publications\/fips\/fips198\/fips-198a.pdf"},{"key":"63_CR32","unstructured":"NIST: Special Publication 800-18\u2014recommendation for key derivation using pseudorandom functions. National Institute of Standards and Technology, U.S. Department of Commerce (2009). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/csrc.nist.gov\/publications\/nistpubs\/800-108\/sp800-108.pdf"},{"key":"63_CR33","unstructured":"NIST: Special Publication 800-63-1\u2014Electronic Authentication Guideline. National Institute of Standards and Technology, U.S. Department of Commerce (2011). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/csrc.nist.gov\/publications\/nistpubs\/800-63-1\/SP-800-63-1.pdf"},{"key":"63_CR34","unstructured":"Nvidia: CUDA C programming guide. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/\n                    \n                   (2012)"},{"key":"63_CR35","unstructured":"Nvidia: Tesla Kepler family product overview. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.nvidia.com\/content\/tesla\/pdf\/Tesla-KSeries-Overview-LR.pdf\n                    \n                   (2012)"},{"key":"63_CR36","unstructured":"Percival, C.: Stronger key derivation via sequential memory-hard functions. In: BSDCan 2009\u2014The Technical BSD Conference (2009). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.bsdcan.org\/2009\/schedule\/attachments\/87_scrypt.pdf"},{"key":"63_CR37","unstructured":"PHC: Password hashing competition. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/password-hashing.net\/\n                    \n                   (2013)"},{"key":"63_CR38","unstructured":"Provos, N., Mazi\u00e8res, D.: A future-adaptable password scheme. In: Proceedings of the FREENIX track: 1999 USENIX Annual Technical Conference (1999)"},{"key":"63_CR39","doi-asserted-by":"crossref","unstructured":"Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption, pp. 191\u2013204. Cambridge Security Workshop. Springer, London (1994)","DOI":"10.1007\/3-540-58108-1_24"},{"key":"63_CR40","unstructured":"SciEngines: Rivyera s3-5000. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/sciengines.com\/products\/computers-and-clusters\/rivyera-s3-5000.html"},{"key":"63_CR41","unstructured":"SciEngines: Rivyera v7-2000t. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/sciengines.com\/products\/computers-and-clusters\/v72000t.html"},{"key":"63_CR42","doi-asserted-by":"publisher","unstructured":"Simplicio Jr, M.A., Barbuda, P., Barreto, P., Carvalho, T., Margi, C.: The marvin message authentication code and the lettersoup authenticated encryption scheme. Secur. Commun. Netw. 2, 165\u2013180 (2009). doi:\n                    10.1002\/sec.66","DOI":"10.1002\/sec.66"},{"issue":"9","key":"63_CR43","doi-asserted-by":"publisher","first-page":"6223","DOI":"10.1109\/TIT.2012.2203093","volume":"58","author":"MA Simplicio Jr","year":"2012","unstructured":"Simplicio Jr, M.A., Barreto, P.S.L.M.: Revisiting the security of the alred design and two of its variants: Marvin and LetterSoup. IEEE Trans. Inf. Theory 58(9), 6223\u20136238 (2012). doi:\n                    10.1109\/TIT.2012.2203093","journal-title":"IEEE Trans. Inf. Theory"},{"key":"63_CR44","unstructured":"Sprengers, M.: GPU-based password cracking: on the security of password hashing schemes regarding advances in graphics processing units. Master\u2019s thesis, Radboud University Nijmegen (2011). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.ru.nl\/publish\/pages\/578936\/thesis.pdf"},{"key":"63_CR45","unstructured":"TrendForce: DRAM contract price (jan.15 2013). \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.trendforce.com\/price\n                    \n                   (visited on Apr. 22, 2013) (2013)"},{"key":"63_CR46","unstructured":"TrueCrypt: TrueCrypt: Free open-source on-the-fly encryption\u2014documentation. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.truecrypt.org\/docs\/\n                    \n                   (2012)"},{"key":"63_CR47","doi-asserted-by":"publisher","unstructured":"Weir, M., Aggarwal, S., Medeiros, B.d., Glodek, B.: Password cracking using probabilistic context-free grammars. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, SP\u201909, pp. 391\u2013405. IEEE Computer Society, Washington, DC (2009). doi:\n                    10.1109\/SP.2009.8","DOI":"10.1109\/SP.2009.8"},{"issue":"9","key":"63_CR48","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1109\/TIT.2005.853307","volume":"51","author":"F Yao","year":"2005","unstructured":"Yao, F., Yin, Y.: Design and analysis of password-based key derivation functions. IEEE Trans. Inf. Theory 51(9), 3292\u20133297 (2005). doi:\n                    10.1109\/TIT.2005.853307","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"63_CR49","first-page":"26","volume":"5","author":"J Yuill","year":"2006","unstructured":"Yuill, J., Denning, D., Feer, F.: Using deception to hide things from hackers: processes, principles, and techniques. J. Inf. Warfare 5(3), 26\u201340 (2006)","journal-title":"J. Inf. Warfare"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s13389-013-0063-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0063-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0063-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T02:17:20Z","timestamp":1581992240000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s13389-013-0063-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,4]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["63"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s13389-013-0063-5","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,4]]}}}