International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery and universal forgery attacks was shown to be suboptimal, following a series of results by Leurent et al. and Peyrin et al. These results have shown that such powerful attacks require significantly less than 2 computations, contradicting the common belief (where denotes the internal state size). In this work, we revisit and extend these results, with a focus on concrete hash functions that limit the message length, and apply special iteration modes. We begin by devising the first state-recovery attack on HMAC with a HAIFA hash function (using a block counter in every compression function call), with complexity 2^4l/5. Then, we describe impro...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication ser...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
Abstract. The security of HMAC (and more general hash-based MACs) against state-recovery and univers...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
Abstract. In this paper we study the security of hash-based MAC algorithms (such as HMAC and NMAC) a...
Abstract. In this paper we study the security of hash-based MAC al-gorithms (such as HMAC and NMAC) ...
In this article we describe new generic distinguishing and forgery attacks in the related-key scenar...
Abstract. In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC,...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication ser...
International audienceMessage Authentication Codes (MACs) are important cryptographic constructions ...
In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authen...
Abstract. HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more gene...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...