Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- Vol. 2006, 37-53
- https://doi.org/10.1007/11935230_3
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- New Proofs for NMAC and HMAC: Security Without Collision-ResistanceLecture Notes in Computer Science, 2006
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)Lecture Notes in Computer Science, 2006
- Merkle-Damgård Revisited: How to Construct a Hash FunctionLecture Notes in Computer Science, 2005
- Collisions of SHA-0 and Reduced SHA-1Lecture Notes in Computer Science, 2005
- New Types of Cryptanalytic Attacks Using Related KeysPublished by Springer Science and Business Media LLC ,2001
- Differential Cryptanalysis of DES-like CryptosystemsPublished by Springer Science and Business Media LLC ,2001
- Differential collisions in SHA-0Published by Springer Science and Business Media LLC ,1998
- Related-key cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEALecture Notes in Computer Science, 1997
- Fast Software EncryptionPublished by Springer Science and Business Media LLC ,1995
- Collisions for the compression function of MD5Lecture Notes in Computer Science, 1994