Note on Distinguishing , Forgery , and Second Preimage Attacks on HMAC-SHA-1 and a Method to Reduce the Key Entropy of NMAC
暂无分享,去创建一个
[1] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[2] Jongsung Kim,et al. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) , 2006, SCN.
[3] Vincent Rijmen,et al. The Impact of Carries on the Complexity of Collision Attacks on SHA-1 , 2006, FSE.
[4] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[5] Hugo Krawczyk,et al. Strengthening Digital Signatures Via Randomized Hashing , 2006, CRYPTO.