The Pythia PRF Service. / Everspaugh, Adam; Chatterjee, Rahul; Juels, Ari; Scott, Samuel; Ristenpart, Thomas.

Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, 2015. p. 547.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

The Pythia PRF Service. / Everspaugh, Adam; Chatterjee, Rahul; Juels, Ari; Scott, Samuel; Ristenpart, Thomas.

Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, 2015. p. 547.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Everspaugh, A, Chatterjee, R, Juels, A, Scott, S & Ristenpart, T 2015, The Pythia PRF Service. in Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, pp. 547. <https://www.usenix.org/node/190917>

APA

Everspaugh, A., Chatterjee, R., Juels, A., Scott, S., & Ristenpart, T. (2015). The Pythia PRF Service. In Proceedings of the 24th USENIX Conference on Security Symposium (pp. 547). USENIX Association. https://www.usenix.org/node/190917

Vancouver

Everspaugh A, Chatterjee R, Juels A, Scott S, Ristenpart T. The Pythia PRF Service. In Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association. 2015. p. 547

Author

Everspaugh, Adam ; Chatterjee, Rahul ; Juels, Ari ; Scott, Samuel ; Ristenpart, Thomas. / The Pythia PRF Service. Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, 2015. pp. 547

BibTeX

@inproceedings{77cf70f42ebb4bb184e592d4444d0b13,
title = "The Pythia PRF Service",
abstract = "Conventional cryptographic services such as hardware-security modules andsoftware-based key management systems offer the ability to apply a pseudorandom function (PRF) such as HMAC to inputs of a client's choosing. These services are used, for example, to harden stored password hashes against offline brute-force attacks. We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease of deployability lacking in prior approaches. ",
author = "Adam Everspaugh and Rahul Chatterjee and Ari Juels and Samuel Scott and Thomas Ristenpart",
year = "2015",
month = aug,
language = "English",
pages = "547",
booktitle = "Proceedings of the 24th USENIX Conference on Security Symposium",
publisher = "USENIX Association",

}

RIS

TY - GEN

T1 - The Pythia PRF Service

AU - Everspaugh, Adam

AU - Chatterjee, Rahul

AU - Juels, Ari

AU - Scott, Samuel

AU - Ristenpart, Thomas

PY - 2015/8

Y1 - 2015/8

N2 - Conventional cryptographic services such as hardware-security modules andsoftware-based key management systems offer the ability to apply a pseudorandom function (PRF) such as HMAC to inputs of a client's choosing. These services are used, for example, to harden stored password hashes against offline brute-force attacks. We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease of deployability lacking in prior approaches.

AB - Conventional cryptographic services such as hardware-security modules andsoftware-based key management systems offer the ability to apply a pseudorandom function (PRF) such as HMAC to inputs of a client's choosing. These services are used, for example, to harden stored password hashes against offline brute-force attacks. We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease of deployability lacking in prior approaches.

M3 - Conference contribution

SP - 547

BT - Proceedings of the 24th USENIX Conference on Security Symposium

PB - USENIX Association

ER -