A new authentication procedure for client-server applications using HMAC
From MaRDI portal
Publication:5035167
Recommendations
Cites work
- Analysis of SHA-512/224 and SHA-512/256
- Attacks on a double length blockcipher-based hash proposal
- Generic Related-Key Attacks for HMAC
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- Performance evaluation of associative based routing in Adhoc networks
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
- The past, evolving present, and future of the discrete logarithm
- Updates on generic attacks against HMAC and NMAC
This page was built for publication: A new authentication procedure for client-server applications using HMAC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5035167)