Sciweavers

4 search results - page 1 / 1
» Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Us...
Sort
View
78
Voted
ASIACRYPT
2006
Springer
15 years 1 months ago
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini, Yiqun Lisa Yin
63
Voted
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....
84
Voted
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 24 min ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
125
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent