HMAC (German Wikipedia)

Analysis of information sources in references of the Wikipedia article "HMAC" in German language version.

refsWebsite
Global rank German rank
214th place
161st place
2nd place
3rd place
1,933rd place
3,857th place
5,032nd place
4,952nd place

doi.org

  • Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. In: Advances in Cryptology – Crypto 96 Proceedings (= Lecture Notes in Computer Science. Band 1109). Springer, 1996, S. 1–15, doi:10.1007/3-540-68697-5_1 (englisch, cseweb.ucsd.edu [PDF]).
  • Mihir Bellare: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Advances in Cryptology – Crypto 2006 Proceedings (= Lecture Notes in Computer Science. Band 4117). Springer, 2006, S. 602–619, doi:10.1007/11818175_36 (englisch, cseweb.ucsd.edu).

iacr.org

eprint.iacr.org

  • Mihir Bellare, Oded Goldreich, Anton Mityagin: The Power of Verification Queries in Message Authentication and Authenticated Encryption. 2004 (englisch, iacr.org).

ietf.org

tools.ietf.org

  • H. Krawczyk, M. Bellare, R. Canetti: RFC: 2104 – HMAC: Keyed-Hashing for Message Authentication. (englisch).
  • RFC: 4868 – Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Mai 2007 (englisch).
  • T. Dierks, E. Rescorla: RFC: 5246 – The Transport Layer Security (TLS) Protocol Version 1.2. (englisch). “The TLS record layer uses a keyed Message Authentication Code (MAC) to protect message integrity. The cipher suites defined in this document use a construction known as HMAC, described in [HMAC], which is based on a hash function. Other cipher suites MAY define their own MAC constructions, if needed.
  • T. Ylonen, C. Lonvick: RFC: 4253 – The Secure Shell (SSH) Transport Layer Protocol. (englisch). “The “hmac-*” algorithms are described in [RFC2104].
  • Sean Turner, Lily Chen: RFC: 6151 – Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. März 2011 (englisch).

ucsd.edu

cseweb.ucsd.edu

  • Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. In: Advances in Cryptology – Crypto 96 Proceedings (= Lecture Notes in Computer Science. Band 1109). Springer, 1996, S. 1–15, doi:10.1007/3-540-68697-5_1 (englisch, cseweb.ucsd.edu [PDF]).
  • Mihir Bellare: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Advances in Cryptology – Crypto 2006 Proceedings (= Lecture Notes in Computer Science. Band 4117). Springer, 2006, S. 602–619, doi:10.1007/11818175_36 (englisch, cseweb.ucsd.edu).