Mihir Bellare, Oded Goldreich, Anton Mityagin: The Power of Verification Queries in Message Authentication and Authenticated Encryption. 2004 (englisch, iacr.org).
H. Krawczyk, M. Bellare, R. Canetti: RFC: 2104 – HMAC: Keyed-Hashing for Message Authentication. (englisch).
RFC: 4868 – Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Mai 2007 (englisch).
T. Dierks, E. Rescorla: RFC: 5246 – The Transport Layer Security (TLS) Protocol Version 1.2. (englisch). “The TLS record layer uses a keyed Message Authentication Code (MAC) to protect message integrity. The cipher suites defined in this document use a construction known as HMAC, described in [HMAC], which is based on a hash function. Other cipher suites MAY define their own MAC constructions, if needed.”
T. Ylonen, C. Lonvick: RFC: 4253 – The Secure Shell (SSH) Transport Layer Protocol. (englisch). “The “hmac-*” algorithms are described in [RFC2104].”
Sean Turner, Lily Chen: RFC: 6151 – Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. März 2011 (englisch).