Message Authentication using Hash Functions- The HMAC Construction (1996)

by Mihir Bellare , Ran Canetti , Hugo Krawczyk
Venue:CryptoBytes
Citations:46 - 1 self

Documents Related by Co-Citation

474 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
328 HMAC: Keyed-Hashing for Message Authentication – H. Krawczyk, M. Bellare, R. Canetti - 1997
76 How to build a trusted database system on untrusted storage – Umesh Maheshwari, Radek Vingralek, William Shapiro - 2000
4 Recherche de Performance dans l’Algorithmique des Corps Finis, Applications à la Cryptographie – F Chabaud - 1996
12 A simple unpredictable random number generator – L Blum, M Blum, M Shub - 1986
420 signatures for untraceable payments – D Chaum, Blind - 1983
829 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
198 A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory – L C Guillou, J-J Quisquater - 1988
829 How To Prove Yourself: Practical Solutions to Identification and Signature Problems – Amos Fiat, Adi Shamir - 1987
202 How to Time-stamp a Digital Document – Stuart Haber, W. Scott Stornetta - 1991
243 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
6 Binding Authentication Key Establishment Protocol for Mobile IPv6 – P AND PERKINS NIKANDER, C
157 Privacy Extensions for Stateless Address Autoconfiguration – Thomas Narten, Richard Draves - 2001
22 The Use of HMAC-SHA-1-96 – C Madsen, R Glenn
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
21 Generating RSA Keys on a Handheld Using an Untrusted Server – N. Modadugu, Nagendra Modadugu, M. Kim, D. Boneh, Michael Kim - 2000
59 Parallel collision search with application to hash functions and discrete logarithms – Paul C. Van Oorschot, Michael J. Wiener - 1994
60 Child-proof authentication for MIPv6 – G O’Shea, M Roe - 2001