G. Brassard and S. Kannan, The generation of random permutations on the fly, Inf. Process. Lett, vol.28, issue.4, pp.207-212, 1988.

J. Bonneau, The science of guessing : Analyzing an anonymized corpus of 70 million passwords, 2012 IEEE Symposium on Security and Privacy, vol.5, p.2012

A. +-16]-rahul-chatterjee, D. Athayle, A. Akhawe, T. Juels, and . Ristenpart, password typos and how to correct them securely, Security and Privacy (SP), 2016 IEEE Symposium on, pp.799-818, 2016.

J. +-17]-rahul-chatterjee, Y. Woodage, A. Pnueli, T. Chowdhury, and . Ristenpart, The typtop system : Personalized typo-tolerant password checking, Proceedings of the 2017

, ACM SIGSAC Conference on Computer and Communications Security, CCS '17, pp.329-346, 2017.

. Patrick-gage, S. Kelley, M. L. Komanduri, R. Mazurek, T. Shay et al., Guess again (and again and again) : Measuring password strength by simulating password-cracking algorithms, Security and Privacy (SP), 2012 IEEE Symposium on, pp.523-537, 2012.

P. Lipa, The security risks of using "forgot my password" to manage passwords, pp.2017-2029, 2016.

W. Ma, J. Campbell, D. Tran, and D. Kleeman, Password entropy and password quality, 2010 Fourth International Conference on Network and System Security, pp.583-587, 2010.

. Nasir-memon, How biometric authentication poses new challenges to our security and privacy, IEEE Signal Processing Magazine, vol.34, issue.4, pp.196-194, 2017.

F. +-15]-blase-ur, J. Noma, S. M. Bees, R. Segreti, L. Shay et al., Nicolas Christin, and Lorrie F. Cranor. I added ' !'at the end to make it secure" : Observing password creation in the lab, Proc. SOUPS, 2015.