On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
From MaRDI portal
Publication:3541891
DOI10.1007/11832072_17zbMath1152.94428OpenAlexW203964163MaRDI QIDQ3541891
Bart Preneel, Alex Biryukov, Jongsung Kim, Seokhie Hong
Publication date: 27 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11832072_17
Related Items (15)
Unintended features of APIs: cryptanalysis of incremental HMAC ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Security of message authentication codes in the presence of key-dependent messages ⋮ A simple variant of the Merkle-Damgård scheme with a permutation ⋮ Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Preimage Attacks on 3, 4, and 5-Pass HAVAL ⋮ Multilane HMAC— Security beyond the Birthday Limit ⋮ New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 ⋮ Security of NMAC and HMAC Based on Non-malleability ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Differential entropy analysis of the IDEA block cipher
Uses Software
This page was built for publication: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)