Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) above the birthday bound. Up to the birthday bound, HMAC and NMAC are proven to be secure under reason-able assumptions on the hash function. On the other hand, if an n-bit MAC is built from a hash function with a l-bit state (l ≥ n), there is a well-known existential forgery attack with complexity 2l/2. However, the remaining security after 2l/2 computations is not well understood. In par-ticular it is widely assumed that if the underlying hash function is sound, then a generic universal forgery attack should require 2n computations and some distinguishing (e.g. distinguishing-H but not distinguishing-R) and state-recovery attacks should als...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
In this work, we study the security of several recent MAC constructions with provable security beyon...
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a P...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
In this work, we study the security of several recent MAC constructions with provable security beyon...
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a P...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
In this work, we study the security of several recent MAC constructions with provable security beyon...
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a P...