Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. In: Advances in Cryptology – Crypto 96 Proceedings (= Lecture Notes in Computer Science. Band1109). Springer, 1996, S.1–15, doi:10.1007/3-540-68697-5_1 (englisch, cseweb.ucsd.edu [PDF]).
Mihir Bellare: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Advances in Cryptology – Crypto 2006 Proceedings (= Lecture Notes in Computer Science. Band4117). Springer, 2006, S.602–619, doi:10.1007/11818175_36 (englisch, cseweb.ucsd.edu).
iacr.org
eprint.iacr.org
Mihir Bellare, Oded Goldreich, Anton Mityagin: The Power of Verification Queries in Message Authentication and Authenticated Encryption. 2004 (englisch, iacr.org).
ietf.org
tools.ietf.org
H. Krawczyk, M. Bellare, R. Canetti: RFC: 2104 – HMAC: Keyed-Hashing for Message Authentication. (englisch).
RFC: 4868 – Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. Mai 2007 (englisch).
T. Dierks, E. Rescorla: RFC: 5246 – The Transport Layer Security (TLS) Protocol Version 1.2. (englisch). “The TLS record layer uses a keyed Message Authentication Code (MAC) to protect message integrity. The cipher suites defined in this document use a construction known as HMAC, described in [HMAC], which is based on a hash function. Other cipher suites MAY define their own MAC constructions, if needed.”
T. Ylonen, C. Lonvick: RFC: 4253 – The Secure Shell (SSH) Transport Layer Protocol. (englisch). “The “hmac-*” algorithms are described in [RFC2104].”
Sean Turner, Lily Chen: RFC: 6151 – Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. März 2011 (englisch).
ucsd.edu
cseweb.ucsd.edu
Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. In: Advances in Cryptology – Crypto 96 Proceedings (= Lecture Notes in Computer Science. Band1109). Springer, 1996, S.1–15, doi:10.1007/3-540-68697-5_1 (englisch, cseweb.ucsd.edu [PDF]).
Mihir Bellare: New Proofs for NMAC and HMAC: Security without Collision-Resistance. In: Advances in Cryptology – Crypto 2006 Proceedings (= Lecture Notes in Computer Science. Band4117). Springer, 2006, S.602–619, doi:10.1007/11818175_36 (englisch, cseweb.ucsd.edu).