Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

HMAC-based One-time Password Algorithm

Known as: HOTP, Hash-Based One-time Password Algorithm 
HOTP is an HMAC-based one-time password (OTP) algorithm. It is a cornerstone of Initiative For Open Authentication (OATH). HOTP was published as an… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The use of deception to enhance security has shown promising results as a defensive technique. In this paper we present an… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2013
2013
HOTP generation algorithm has safety risks because the counter is easily predicted. This paper describes TOTP generation… Expand
Is this relevant?
2012
2012
This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed… Expand
  • figure 1
Is this relevant?
2011
2011
Transport Layer Security (TLS) constitutes the main protocol used to secure the exchanges in the Internet. Indeed, this protocol… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Review
2011
Review
2011
This document describes an extension of the One-Time Password (OTP) algorithm, namely the HMAC-based One-Time Password (HOTP… Expand
  • table 1
Is this relevant?
2011
2011
This document describes the OATH algorithm for challenge-response authentication and signatures. This algorithm is based on the… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This document describes an extension of one-time password algorithm HOTP as defined in [RFC4226] to support time based moving… Expand
  • table 1
Is this relevant?
2011
2011
With the rapid growth of Internet users and wireless applications, interests on home networks have been enormously increased in… Expand
Is this relevant?
2009
2009
Current authentications with a secret key are based on the Challenge-Response paradigm. This mechanism avoids the clear… Expand
  • figure 3
  • figure 1
  • figure 4
  • figure 2
  • figure 7
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC). A… Expand
Is this relevant?