Acknowledgement
Supported by : 한국인터넷진흥원, 한국연구제단
References
- Leslie Lamport, "Password Authentication with Insecure Communication", Communications of the ACM, Vol. 24, pp. 770-772, Nov. 1981. https://doi.org/10.1145/358790.358797
- N. Haller, C. Metz. P Nesser, and M Straw, "One-Time Password System", RFC 2289, Feb. 1999.
- D.M. Raihi, M. Bellare, F. Hoornaert, D. Naccache, and O. ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", RFC 4226, Dec. 2005.
- D.M. Raihi, S. Machani, M. Pei, and J. Rydell, "TOTP: Time-Based One-Time Password Algorithm", RFC 6238, May. 2011.
- D. Coppersmith, "Almost optimal hash sequence taversal", Proceedings of the 4th Conference on Financial Cryptography, pp. 102-119, Feb. 2002
- M. Jakobsson, "Fractal hash sequence representation and traversal", Proceedings of the 2002 IEEE Symposium on Information Theory, Jul. 2002.
- M. Fischlin, "Fast verification of hash chains", Proceedings of the RSA Security Cryptographer's Track, pp. 339-352, Feb. 2004.
- M.H. Elderfrawy, M.K. Khan, and K. alghathbar, "Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem", Sensors, vol. 10, no. 9, pp. 8683-8695, Sep. 2010. https://doi.org/10.3390/s100908683
- M.H. Elderfrawy, M.K. Khan, and K. alghathbar, "One-time password authentication with infinite nested hash chains", U.S. Patent Application Publication US20130191899 a1, 2013.
- S. Bittl, "Efficient construction of infinite length hash chains with perfect forward secrecy using two independent hash functions", Proceedings of the 11th International Conference on Security and Cryptography, Aug. 2014.
- K. Bicakci, N. Baykal, "Infinite length hash chains and their applications", Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp 57-61, Jun. 2002.Naccache, and O. ranen, "HOTP: An HMAC-Based One-Time Password Algorithm", RFC 4226, Dec. 2005.