1. Science
  2. Publications
  3. Information Processing Systems
  4. 4(129)'2015
  5. Construction of two-factor authentication scheme based on crypto-coding schemes usage

Construction of two-factor authentication scheme based on crypto-coding schemes usage

S.P. Yevseiev, B.P. Tomashevskyy, V.V. Ohurtsov, T.A. Sverdlo
Annotations languages:

The basic principles of the crypto-code schemes McEliece and Niederreiter. The analysis of the various systems of two-factor authentication, their opposition to various types of attacks. The scheme of two-factor authentication using crypto-code schemes McEliece and Niederreiter in order to increase the reliability of the authenticator generated in the two-factor authentication scheme.
Keywords: two-factor authentication, crypto-code scheme McEliece and Niederreiter
Reference:
Evseev, S.P., Tomashevskii, B.P., Ogurtsov, V.V. and Sverdlo, T.A. (2015), "Postroenie skhemy dvukhfaktornoi autentifikatsii na osnove ispolzovaniia kripto-kodovykh skhem" [Construction of two-factor authentication scheme based on crypto-coding schemes usage], Information Processing Systems, Vol. 4(129), pp. 96-104.