HMAC
Top View
- Hash Function
- EIGRP/SAF HMAC-SHA-256 Authentication
- Hash Algorithms and MAC Algorithms [PDF]
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Guidelines on Cryptographic Algorithms Usage and Key Management
- Ccsds 350.9-G-1
- Lecture 5 (Cryptographic Hash Functions)
- Cryptographic Hash Functions Message Authentication Digital Signatures Abstract
- Keying Hash Functions for Message Authentication
- FIPS 202, the SHA-3 Standard Overview and Recommendations
- SNMP Authentication
- Draft-Nayak-Tcp-Sha2-02 SHA-2 Algorithm for the TCP Authentication Option (TCP-AO)
- Verified Correctness and Security of Openssl HMAC Lennart Beringer, Princeton University; Adam Petcher, Harvard University and MIT Lincoln Laboratory; Katherine Q
- Cipher Suite Configuration Mode Commands
- Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- Computer Security: Principles and Practice
- High-Speed Encryption and Authentication