|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 56 occurrences of 29 keywords
|
|
|
Results
Found 48 publication records. Showing 48 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
184 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
184 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
169 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
122 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
115 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
74 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
74 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
68 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
28 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
28 | Akinori Hosoyamada, Tetsu Iwata |
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. |
CRYPTO (1) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Fang Song 0001, Aaram Yun |
Quantum Security of NMAC and Related Constructions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
28 | Fang Song 0001, Aaram Yun |
Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks. |
CRYPTO (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without Collision Resistance. |
J. Cryptol. |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro |
Generic Security of NMAC and HMAC with Input Whitening. |
ASIACRYPT (2) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. |
FSE |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Peter Gazi, Krzysztof Pietrzak, Michal Rybár |
The Exact PRF-Security of NMAC and HMAC. |
CRYPTO (1) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang 0031 |
Updates on Generic Attacks against HMAC and NMAC. |
CRYPTO (1) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong |
Security Analysis of HMAC/NMAC by Using Fault Injection. |
J. Appl. Math. |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu |
Cryptanalysis of HMAC/NMAC-Whirlpool. |
ASIACRYPT (2) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda |
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. |
IWSEC |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Fanbao Liu, Changxiang Shen, Tao Xie |
Equivalent Inner Key Recovery Attack to NMAC. |
CISIS/ICEUTE/SOCO Special Sessions |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng |
On the Security of NMAC and Its Variants. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
28 | Lei Wang 0031, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro |
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. |
IEICE Trans. Inf. Syst. |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Hongbo Yu, Xiaoyun Wang 0001 |
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. |
ISPEC |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai |
An Update on the Analysis and Design of NMAC and HMAC Functions. |
Int. J. Netw. Secur. |
2008 |
DBLP BibTeX RDF |
|
28 | Christian Rechberger, Vincent Rijmen |
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. |
J. Univers. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
28 | Vlastimil Klíma |
A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
28 | Donghoon Chang, Mridul Nandi |
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
28 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security Without Collision-Resistance. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
28 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
28 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Kan Yasuda |
Boosting Merkle-Damgård Hashing for Message Authentication. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, hash function, message authentication code, mode of operation, HMAC, related-key attack, pseudo-random function, compression function, NMAC |
26 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
20 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
20 | Yevgeniy Dodis, John P. Steinberger |
Message Authentication Codes from Unpredictable Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Zheng Gong, Xuejia Lai, Kefei Chen |
A synthetic indifferentiability analysis of some block-cipher-based hash functions. |
Des. Codes Cryptogr. |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 68W40, 68Q25 |
20 | Marc Fischlin |
Security of NMACand HMACBased on Non-malleability. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jean-Philippe Aumasson, Willi Meier |
Analysis of Multivariate Hash Functions. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mihir Bellare, Ran Canetti, Hugo Krawczyk |
Keying Hash Functions for Message Authentication. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #48 of 48 (100 per page; Change: )
|
|