Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
From MaRDI portal
Publication:3627431
DOI10.1007/978-3-642-01001-9_7zbMath1239.94067OpenAlexW1560798398MaRDI QIDQ3627431
Zhan, Tao, Hongbo Yu, Wei Wang, Xiaoyun Wang, Haina Zhang
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_7
Related Items (5)
Security analysis of randomize-hash-then-sign digital signatures ⋮ Improved collision detection of MD5 with additional sufficient conditions ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Fast correlation attack on stream cipher ABC v3 ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
Cites Work
- Keying Hash Functions for Message Authentication
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Advances in Cryptology – CRYPTO 2004
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- On Authentication with HMAC and Non-random Properties
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- New Proofs for NMAC and HMAC: Security Without Collision-Resistance
- Unnamed Item
- Unnamed Item
This page was built for publication: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC