1. Science
  2. Publications
  3. Information Processing Systems
  4. 4(129)'2015
  5. Construction of two-factor authentication scheme based on crypto-coding schemes usage

Construction of two-factor authentication scheme based on crypto-coding schemes usage

S.P. Yevseiev, B.P. Tomashevskyy, V.V. Ohurtsov, T.A. Sverdlo
Annotations languages:

The basic principles of the crypto-code schemes McEliece and Niederreiter. The analysis of the various systems of two-factor authentication, their opposition to various types of attacks. The scheme of two-factor authentication using crypto-code schemes McEliece and Niederreiter in order to increase the reliability of the authenticator generated in the two-factor authentication scheme.
Keywords: two-factor authentication, crypto-code scheme McEliece and Niederreiter