Another look at HMAC
From MaRDI portal
Publication:2861350
Recommendations
- The exact PRF-security of NMAC and HMAC
- New proofs for NMAC and HMAC: security without collision resistance
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- On Authentication with HMAC and Non-random Properties
Cited in
(15)- The exact PRF-security of NMAC and HMAC
- One-key compression function based MAC with security beyond birthday bound
- On the security of the WOTS-PRF signature scheme
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- On Authentication with HMAC and Non-random Properties
- Multi-key security: the Even-Mansour construction revisited
- About ``\(k\)-bit security of MACs based on hash function Streebog
- Keyed Streebog is a secure PRF and MAC
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
- To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC
- A new authentication procedure for client-server applications using HMAC
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Multilane HMAC— Security beyond the Birthday Limit
This page was built for publication: Another look at HMAC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2861350)