[go: up one dir, main page]

Hoornaert et al., 2005 - Google Patents

Network Working Group D. M'Raihi Request for Comments: 4226 VeriSign Category: Informational M. Bellare UCSD

Hoornaert et al., 2005

View PDF
Document ID
7268093009230083585
Author
Hoornaert F
Naccache D
Ranen O
Publication year

External Links

Snippet

This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC). A security analysis of the algorithm is presented, and important parameters related to the secure deployment of the algorithm are …
Continue reading at 5.179.1.4 (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
M'Raihi et al. Hotp: An hmac-based one-time password algorithm
EP1828946B1 (en) One time password
US6892301B1 (en) Method and system for securely handling information between two information processing devices
EP1751913B1 (en) Signature generation and verification method using time lock puzzle
M'Raihi et al. RFC 4226: HOTP: An HMAC-based one-time password algorithm
EP1022638A2 (en) Method and system for securely handling information between two information processing devices
CN116881865A (en) A license generation method and system
Ramtri et al. Secure banking transactions using RSA and two fish algorithms
Mitchell Remote user authentication using public information
Hoornaert et al. Network Working Group D. M’Raihi Request for Comments: 4226 VeriSign Category: Informational M. Bellare UCSD
Bhatia Cryptography-The Hidden Message
Kara et al. An encrypted and signed plaintext symmetric cryptosystem
Rabah Secure implementation of message digest, authentication and digital signature
Korobeinikova SEARCHING FOR SOLUTIONS FOR SERVER IMPLEMENTATION OF DIGITAL SIGNATURE IN AN AUTOMATED DOCUMENT MANAGEMENT SYSTEM.
Shi et al. Research on System Data Security Based on State Secret Algorithm
Glushachenko Public key cryptosystems and their application in digital signature algorithms
Gutmann Encryption and Security Tutorial
Lo A framework for cryptography algorithms on mobile devices
BSAFE Crypto-J
Bıçakcı On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach
Grasso et al. Definition of terms used by the Auto-ID Labs in the anti-counterfeiting white paper series
Blomqvist Kleptography--Overview and a new proof of concept
CN120513601A (en) Method and apparatus for enabling user equipment to utilize secrets
Antheunisse et al. Cryptography with Backdoors
Ho Hybrid cryptosystem using symmetric algorithms and public-key algorithms