A new authentication procedure for client-server applications using HMAC
From MaRDI portal
Publication:5035167
DOI10.1080/09720529.2021.1932908OpenAlexW3198671602MaRDI QIDQ5035167FDOQ5035167
Atul Chaturvedi, M. Misra, Varun Shukla
Publication date: 21 February 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2021.1932908
Recommendations
key agreementsymmetric keyhash based message authentication codesman in the middle attacksecured hash algorithm
Cites Work
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Generic Related-Key Attacks for HMAC
- The Past, Evolving Present, and Future of the Discrete Logarithm
- Analysis of SHA-512/224 and SHA-512/256
- Updates on Generic Attacks against HMAC and NMAC
- Attacks on a double length blockcipher-based hash proposal
- Performance evaluation of associative based routing in Adhoc networks
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
Uses Software
This page was built for publication: A new authentication procedure for client-server applications using HMAC
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5035167)