The basic principles of the crypto-code schemes McEliece and Niederreiter. The analysis of the various systems of two-factor authentication, their opposition to various types of attacks. The scheme of two-factor authentication using crypto-code schemes McEliece and Niederreiter in order to increase the reliability of the authenticator generated in the two-factor authentication scheme.
two-factor authentication, crypto-code scheme McEliece and Niederreiter
"Postroenye skhemы dvukhfaktornoi autentyfykatsyy na osnove yspolzovanyia krypto-kodovыkh skhem" [Construction of two-factor authentication scheme based on crypto-coding schemes usage],
Information Processing Systems,