The effectiveness of [cryptographic] protection depends on a … of these issues is equally important: if a … a password is poorly selected or protected, then … for the determination of cryptographic key sizes. … if current trends persist, then following our guidelines … As far as we know this article is … generally accepted cryptosystems. … [p. 3] from a computational point of view the … [i.e., equivalent Mips Years to break the cryptosystem].
Google-1
Google-2
Copyright clearance needed for quotation.