Message Authentication using Hash Functions- The HMAC Construction (1996)

by Mihir Bellare , Ran Canetti , Hugo Krawczyk
Venue:CryptoBytes
Citations:46 - 1 self

Active Bibliography

476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security – Ran Canettiy, Hugo Krawczykz - 1996
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
7 Minding Your MAC Algorithms – Helena Handschuh , Bart Preneel - 2004
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
328 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
12 Asymmetric Encryption: Evolution and Enhancements – Don B. Johnson - 1996
24 The Foundations of Modern Cryptography – Oded Goldreich - 1998
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
1 Message Encryption and Authentication Using One-Way Hash Functions – Chae Hoon Lim - 1996