On Authentication with HMAC and Non-random Properties
From MaRDI portal
Publication:5448627
DOI10.1007/978-3-540-77366-5_13zbMath1195.94075OpenAlexW1550771246MaRDI QIDQ5448627
Christian Rechberger, Vincent Rijmen
Publication date: 7 March 2008
Published in: Financial Cryptography and Data Security (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-1059.pdf
Related Items (7)
Security analysis of randomize-hash-then-sign digital signatures ⋮ Classification and generation of disturbance vectors for collision attacks against SHA-1 ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Practical Analysis of Reduced-Round Keccak
This page was built for publication: On Authentication with HMAC and Non-random Properties