|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 56 occurrences of 29 keywords
|
|
|
Results
Found 48 publication records. Showing 48 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
184 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.  |
EUROCRYPT  |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
184 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.  |
CRYPTO  |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
169 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.  |
INDOCRYPT  |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
122 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.  |
ICICS  |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
115 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.  |
EUROCRYPT  |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
74 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.  |
AFRICACRYPT  |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
74 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.  |
FSE  |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
68 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.  |
ASIACRYPT  |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).  |
SCN  |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties.  |
Financial Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs.  |
ACISP  |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
28 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.  |
IACR Cryptol. ePrint Arch.  |
2021 |
DBLP BibTeX RDF |
|
28 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model.  |
CRYPTO (1)  |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Fang Song 0001, Aaram Yun |
Quantum Security of NMAC and Related Constructions.  |
IACR Cryptol. ePrint Arch.  |
2017 |
DBLP BibTeX RDF |
|
28 | Fang Song 0001, Aaram Yun |
Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks.  |
CRYPTO (2)  |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without Collision Resistance.  |
J. Cryptol.  |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening.  |
IACR Cryptol. ePrint Arch.  |
2015 |
DBLP BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening.  |
ASIACRYPT (2)  |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC.  |
IACR Cryptol. ePrint Arch.  |
2014 |
DBLP BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.  |
FSE  |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC.  |
CRYPTO (1)  |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Updates on Generic Attacks against HMAC and NMAC.  |
CRYPTO (1)  |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong |
Security Analysis of HMAC/NMAC by Using Fault Injection.  |
J. Appl. Math.  |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool.  |
ASIACRYPT (2)  |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda |
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.  |
IWSEC  |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Fanbao Liu, Changxiang Shen, Tao Xie |
Equivalent Inner Key Recovery Attack to NMAC.  |
CISIS/ICEUTE/SOCO Special Sessions  |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng |
On the Security of NMAC and Its Variants.  |
IACR Cryptol. ePrint Arch.  |
2011 |
DBLP BibTeX RDF |
|
28 | Lei Wang 0031, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro |
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC.  |
IEICE Trans. Inf. Syst.  |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Hongbo Yu, Xiaoyun Wang 0001 |
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.  |
ISPEC  |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai |
An Update on the Analysis and Design of NMAC and HMAC Functions.  |
Int. J. Netw. Secur.  |
2008 |
DBLP BibTeX RDF |
|
28 | Christian Rechberger, Vincent Rijmen |
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions.  |
J. Univers. Comput. Sci.  |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths.  |
IACR Cryptol. ePrint Arch.  |
2008 |
DBLP BibTeX RDF |
|
28 | Vlastimil Klíma |
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
28 | Donghoon Chang, Mridul Nandi |
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
28 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security Without Collision-Resistance.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
28 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.  |
IACR Cryptol. ePrint Arch.  |
2006 |
DBLP BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance.  |
CRYPTO  |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication.  |
ASIACRYPT  |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
26 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit.  |
INDOCRYPT  |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
20 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.  |
ACISP  |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
20 | Yevgeniy Dodis, John P. Steinberger |
Message Authentication Codes from Unpredictable Block Ciphers.  |
CRYPTO  |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Zheng Gong, Xuejia Lai, Kefei Chen |
A synthetic indifferentiability analysis of some block-cipher-based hash functions.  |
Des. Codes Cryptogr.  |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 68W40, 68Q25 |
20 | Marc Fischlin |
Security of NMACand HMACBased on Non-malleability.  |
CT-RSA  |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jean-Philippe Aumasson, Willi Meier |
Analysis of Multivariate Hash Functions.  |
ICISC  |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mihir Bellare, Ran Canetti, Hugo Krawczyk |
Keying Hash Functions for Message Authentication.  |
CRYPTO  |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #48 of 48 (100 per page; Change: )
|
|