Skip to search formSkip to main contentSkip to account menu

Hash-based message authentication code

Known as: HMAC SHA256, NMAC, Hmac MD5 
An iterative hash function breaks up a message into blocks of a fixed size and iterates over them with a compression function. For example, MD5 and… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Nowadays, with the fast growth of information and communication technologies (ICTs) and the vulnerabilities threatening human… 
2018
2018
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these… 
2014
2014
In this paper, we present new generic attacks against HMAC and other similar MACs when instantiated with an n-bit output hash… 
2012
2012
Phishing, a serious security threat to Internet users is an e-mail fraud in which the perpetrator sends out an email which looks… 
2011
2011
  • 2011
  • Corpus ID: 33880911
2010
2010
User Authentication is defined as ‘Provision of Assurance that the message is originated from authorized user’. Message… 
2007
2007
The Mobile Trusted Platform (MTP) is developed and promoted by the Trusted Computing Group (TCG), which is an industry standard… 
2003
2003
Security has become a highly critical issue in the provision of mobile services. The Wireless Application Protocol (WAP) has… 
2002
2002
In this paper, we propose classes of Message Authentication Codes (MAC) based on error correcting-codes. We introduce a new… 
Highly Cited
2001
Highly Cited
2001
In this paper, we present the results of the first phase of a project aimed at implementing a full suite of IPSec cryptographic…