The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In this algorithm, a shared secret is used to derive a One-Time Password (OTP). However, in TOTP, the client and the server need to agree on a shared secret (i.e., a key). As a consequence, an adversary can construct an OTP through the compromised key if the server is hacked. To solve this problem, Kogan et al. proposed T/Key, an OTP algorithm based on a hash chain. However, the efficiency of OTP generation and verification is low in T/Key. In this article, we propose a novel and efficient Merkle tree-based One-Time Password (MOTP) algorithm to overcome such limitations. Compared to T/Key, this proposal reduces the number of hash operations to ...
International audienceIn this paper we evaluate the security of a two-fac...
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
Abstract – In earlier, two smart card based password authentication key exchange protocols were prop...
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In...
In the interest of digital security, 2-Factor Authentication (2FA), has been widely used throughout ...
This paper builds on the multi-time signature scheme proposed by Merkle. We prove that the original ...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
In today’s world the important factor to be consider in cloud is security of the data, where user st...
Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and ...
While the classical attack of ``monitor the network and intercept the password'' can be avoided by a...
AbstractOne-Time Passwords (OTP) can provide complete protection of the login-time authentication me...
Abstract: Authentication based on cryptographic techniques is a subject of great interest in many fi...
The mutli-server environment of many Internet services available today such as Google, and the avail...
With the successful proliferation of data outsourcing services, security and privacy issues have dra...
In this paper we evaluate the security of a two-factor Graphical Password scheme proposed in [1]. As...
International audienceIn this paper we evaluate the security of a two-fac...
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
Abstract – In earlier, two smart card based password authentication key exchange protocols were prop...
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In...
In the interest of digital security, 2-Factor Authentication (2FA), has been widely used throughout ...
This paper builds on the multi-time signature scheme proposed by Merkle. We prove that the original ...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
In today’s world the important factor to be consider in cloud is security of the data, where user st...
Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and ...
While the classical attack of ``monitor the network and intercept the password'' can be avoided by a...
AbstractOne-Time Passwords (OTP) can provide complete protection of the login-time authentication me...
Abstract: Authentication based on cryptographic techniques is a subject of great interest in many fi...
The mutli-server environment of many Internet services available today such as Google, and the avail...
With the successful proliferation of data outsourcing services, security and privacy issues have dra...
In this paper we evaluate the security of a two-factor Graphical Password scheme proposed in [1]. As...
International audienceIn this paper we evaluate the security of a two-fac...
One-time signatures have been known for more than two decades, and have been studied mainly due to t...
Abstract – In earlier, two smart card based password authentication key exchange protocols were prop...