MDx-MAC and building fast MACs from hash functions

B Preneel, PC Van Oorschot - Annual International Cryptology Conference, 1995 - Springer
We consider the security of message authentication code (MAC) algorithms, and the
construction of MACs from fast hash functions. A new forgery attack applicable to all iterated …

On the security of iterated message authentication codes

B Preneel, PC Van Oorschot - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
The security of iterated message authentication code (MAC) algorithms is considered, and in
particular, those constructed from unkeyed hash functions. A new MAC forgery attack …

Key-recovery attacks on universal hash function based MAC algorithms

H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …

On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

J Kim, A Biryukov, B Preneel, S Hong - International Conference on …, 2006 - Springer
HMAC is a widely used message authentication code and a pseudorandom function
generator based on cryptographic hash functions such as MD5 and SHA-1. It has been …

UMAC: Fast and secure message authentication

J Black, S Halevi, H Krawczyk, T Krovetz… - Advances in Cryptology …, 1999 - Springer
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …

Keying hash functions for message authentication

M Bellare, R Canetti, H Krawczyk - … Barbara, California, USA August 18–22 …, 1996 - Springer
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has
become a standard approach in many applications, particularly Internet security protocols …

Method of building fast MACS from hash functions

BKB Preneel, PC Van Oorschot - US Patent 5,664,016, 1997 - Google Patents
Hash functions are important in modern cryptography. Main applications are their use in
conjunction with digital signa ture schemes and message authentication. Hash functions …

RFC2104: HMAC: Keyed-hashing for message authentication

H Krawczyk, M Bellare, R Canetti - 1997 - dl.acm.org
This document describes HMAC, a mechanism for message authentication using
cryptographic hash functions. HMAC can be used with any iterative cryptographic hash …

[PDF][PDF] The keyed-hash message authentication code (hmac)

JM Turner - Federal Information Processing Standards Publication, 2008 - csrc.nist.gov
FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC) Page 1 FIPS PUB 198-1
FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash …

[PDF][PDF] Message authentication using hash functions: The HMAC construction

M Bellare, R Canetti, H Krawczyk - RSA Laboratories' CryptoBytes, 1996 - Citeseer
There has recently been a lot of interest in the subject of authenticating information using
cryptographic hash functions like MD5 and SHA, particularly for Internet security protocols …