Hash chains have been used as OTP generators. Lamport hashes have an intensive computation cost and a chain length restriction. A solution for signature chains addressed this by involving public key techniques, which increased the average computation cost. Although a later idea reduced the user computation by sharing it with the host, it couldn’t overcome the length limitation. The scheme proposed by Chefranov to eliminate the length restriction had a deficiency in the communication cost overhead. We here present an algorithm that overcomes all of these shortcomings by involving two different nested hash chains: one dedicated to seed updating and the other used for OTP production. Our algorithm provides forward and non-restricted OTP genera...
Objectives: In this paper, an approach to online banking authorization using one-time passwords has ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
OTP (One Time Password) is not an old term for security field in computer science. There are various...
Hash Chains are used extensively in various cryptography, applications such as one-time passwords, s...
AbstractThis paper proposes a novel one-time password (OTP) mutual authentication scheme based on ch...
While the classical attack of ``monitor the network and intercept the password'' can be avoided by a...
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In...
Abstract. We present new ideas for decreasing the size of secure memory needed for hardware imple-me...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
Abstract: "One-way chains are an important cryptographic primitive in many security applications. La...
One-way hash chains have been used to secure many applications over the last three decades. To overc...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resourc...
Objectives: In this paper, an approach to online banking authorization using one-time passwords has ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
OTP (One Time Password) is not an old term for security field in computer science. There are various...
Hash Chains are used extensively in various cryptography, applications such as one-time passwords, s...
AbstractThis paper proposes a novel one-time password (OTP) mutual authentication scheme based on ch...
While the classical attack of ``monitor the network and intercept the password'' can be avoided by a...
The Time-based One-Time Password (TOTP) algorithm is commonly used for two-factor authentication. In...
Abstract. We present new ideas for decreasing the size of secure memory needed for hardware imple-me...
We use interactive hashing to achieve the most efficient OT protocol to date based solely on the ass...
Abstract: "One-way chains are an important cryptographic primitive in many security applications. La...
One-way hash chains have been used to secure many applications over the last three decades. To overc...
One-time signature schemes rely on hash functions and are, therefore, assumed to be resistant to att...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
One-time signature (OTS) offer a viable alternative to public key-based digital signatures. OTS secu...
Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resourc...
Objectives: In this paper, an approach to online banking authorization using one-time passwords has ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
OTP (One Time Password) is not an old term for security field in computer science. There are various...