Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
- 1 January 2009
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Published by Springer Science and Business Media LLC ,2008
- On Authentication with HMAC and Non-random PropertiesLecture Notes in Computer Science, 2007
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Published by Springer Science and Business Media LLC ,2006
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash CollisionsLecture Notes in Computer Science, 2006
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)Lecture Notes in Computer Science, 2006
- Cryptanalysis of the Hash Functions MD4 and RIPEMDLecture Notes in Computer Science, 2005
- Near-Collisions of SHA-0Lecture Notes in Computer Science, 2004
- Collisions for the compression function of MD5Lecture Notes in Computer Science, 1994
- Message authentication with one-way hash functionsACM SIGCOMM Computer Communication Review, 1992
- HOW TO SWINDLE RABINCryptologia, 1979