Security and Performance Considerations of Improved Password Authentication Algorithm, Based on OTP and Hash-Chains

[1]  Haojun Zhang,et al.  Self-Updating Hash Chains and Their Implementations , 2006, WISE.

[2]  Markus Jakobsson,et al.  Efficient Constructions for One-Way Hash Chains , 2005, ACNS.

[3]  Alexander G. Chefranov,et al.  One-Time Password Authentication with Infinite Hash Chains , 2008 .

[4]  Markus Jakobsson,et al.  Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.

[5]  Chang-Seop Park,et al.  One-time password based on hash chain without shared secret and re-registration , 2018, Comput. Secur..

[6]  Muhammad Khurram Khan,et al.  OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[7]  Mashkuri Yaacob,et al.  Offline OTP Based Solution for Secure Internet Banking Access , 2018, 2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e).

[8]  Kemal Bicakci,et al.  Improving the Security and Flexibility of One-Time Passwords by Signature Chains , 2003 .

[9]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[10]  Xiaoyuan Yang,et al.  A New Self-Updating Hash Chain Structure Scheme , 2009, 2009 International Conference on Computational Intelligence and Security.