HOTP

Results: 34



#Item
21Internet protocols / HOTP / Scripting languages / Component Object Model / UTF-8 / OLE Automation / Application programming interface / JavaScript / Internet Explorer / Computing / Software / Object-oriented programming

Yubikey Server COM API YubiKey device server-side interface component Version: 1.1

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2012-05-28 09:09:05
22Windows Vista / System software / HOTP / Windows / One-time password / Security and safety features new to Windows Vista / Microsoft Windows / Computing / Computer architecture

YubiKey Configuration Utility for Windows User Guide Version: 2.2 May 24, 2012

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2012-05-28 10:40:50
23Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
24HOTP / Computing / Message authentication codes / Cryptographic hash functions / One-time password / HMAC / Password / SHA-1 / Two-factor authentication / Cryptography / Internet protocols / Security

http://www.ietf.org/rfc/rfc4226.txt

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:04
25Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
26Software / HOTP / Computing / Games / World of Warcraft / Google Authenticator / Internet protocols / Authenticator / Two-factor authentication

Yubico Authenticator Introduction February 7, 2014 yubico cococo

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-02-11 12:29:04
27Internet protocols / HOTP / Scripting languages / Component Object Model / UTF-8 / OLE Automation / Application programming interface / JavaScript / Internet Explorer / Computing / Software / Object-oriented programming

Yubikey Server COM API YubiKey device server-side interface component Version: 1.1

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:35
28One-time password / Internet protocols / HOTP / Universal Serial Bus / Two-factor authentication / Non-volatile memory / USB human interface device class / USB flash drive / Computer hardware / Computing / Security

yubico cococo The YubiKey Manual Usage, configuration and introduction of basic concepts

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2013-07-03 10:48:24
29Randomness / Computing platforms / HOTP / Personalization / One-time password / /dev/random / Cross-platform / USB flash drive / Computing / Device file / Information science

Cross-platform YubiKey Personalization Tool User Guide Software Version[removed]Document Version 1.1

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:04
30One-time password / Two-factor authentication / Authentication / Password / Federated identity / Security token / HOTP / Security / Computer security / Access control

YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:23
UPDATE