This is the old Cryptosmith web site.
Up-to-date content related to cyber security is being migrated from this site to the new site.
Click here to visit the new site.
Excerpt from Chapter 6 of
Authentication: From Passwords to Public Keys
Copyright © 2002 Addison-Wesley.
This paper was also published as an article in CSI's Computer Security Journal, Summer 2002 (see Note 14).
Copyright 2014 Cryptosmith LLC
Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer