A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator
[chapter]
2013
Lecture Notes in Computer Science
The classical way of authentication with a username-password pair is often insufficient: an adversary can choose from a multitude of methods to obtain the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the authentication process have been proposed. A particularly wide-spread approach provides each user with a
doi:10.1007/978-3-642-41284-4_11
fatcat:strylhjlg5bvfoopn377lphu64