Unintended features of APIs: cryptanalysis of incremental HMAC
From MaRDI portal
Publication:832351
DOI10.1007/978-3-030-81652-0_12zbMath1485.94055OpenAlexW3184752242MaRDI QIDQ832351
Stav Perle, Gal Benmocha, Eli Biham
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_12
Related Items (1)
Uses Software
Cites Work
- New proofs for NMAC and HMAC: security without collision resistance
- Keying Hash Functions for Message Authentication
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- Advances in Cryptology – CRYPTO 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Unintended features of APIs: cryptanalysis of incremental HMAC