A new authentication procedure for client-server applications using HMAC
From MaRDI portal
Publication:5035167
DOI10.1080/09720529.2021.1932908OpenAlexW3198671602MaRDI QIDQ5035167
Atul Chaturvedi, Manoj Kumar Misra, Varun Shukla
Publication date: 21 February 2022
Published in: Journal of Discrete Mathematical Sciences and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/09720529.2021.1932908
key agreementsymmetric keyhash based message authentication codesman in the middle attacksecured hash algorithm
Uses Software
Cites Work
- Attacks on a double length blockcipher-based hash proposal
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- Analysis of SHA-512/224 and SHA-512/256
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
- Updates on Generic Attacks against HMAC and NMAC
- Generic Related-Key Attacks for HMAC
- The Past, Evolving Present, and Future of the Discrete Logarithm
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Performance evaluation of associative based routing in Adhoc networks
This page was built for publication: A new authentication procedure for client-server applications using HMAC