It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password,while preventing off-line brute-force attacks associated with the weak secret.
SANS 11770-4:2007 history
2007SANS 11770-4:2007 Information technology - Security techniques - Key management Part 4: Mechanisms based on weak secrets