d-HMAC Dynamic HMAC function
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Russ Housley,et al. Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key , 2003, RFC.
[3] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[4] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[5] Bart Preneel,et al. Cryptographic Primitives for Information Authentication - State of the Art , 1997, State of the Art in Applied Cryptography.
[6] Mohannad Najjar. Petra-r Cryptographic Hash Functions , 2003, Security and Management.
[7] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[8] Gerhard Goos,et al. State of the Art in Applied Cryptography , 1998, Lecture Notes in Computer Science.
[9] Michael J. Oehler,et al. HMAC-MD5 IP Authentication with Replay Prevention , 1997, RFC.
[10] Anna Grocholewska-Czurylo,et al. Generating Bent Functions , 2001, ACS.
[11] Angelos D. Keromytis,et al. The Use of HMAC-RIPEMD-160-96 within ESP and AH , 2000, RFC.
[12] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[13] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.