Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
From MaRDI portal
Publication:3612542
DOI10.1007/978-3-540-74143-5_2zbMath1215.94046OpenAlexW1513113529MaRDI QIDQ3612542
Phong Q. Nguyen, Gaëtan Leurent, Pierre-Alain Fouque
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_2
Related Items (10)
Security analysis of randomize-hash-then-sign digital signatures ⋮ Impossible Differential Properties of Reduced Round Streebog ⋮ Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function ⋮ Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 ⋮ New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
This page was built for publication: Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5