HMAC (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "HMAC" in English language version.

refsWebsite
Global rank English rank
6,184th place
4,465th place
2nd place
2nd place
214th place
176th place
207th place
136th place
355th place
454th place
5,032nd place
3,357th place
1,933rd place
1,342nd place
low place
low place
8,888th place
6,276th place
low place
low place
1st place
1st place
low place
low place
5th place
5th place

doi.org (Global: 2nd place; English: 2nd place)

iacr.org (Global: 5,032nd place; English: 3,357th place)

eprint.iacr.org

iacr.org

  • Wang, Xiaoyun; Yu, Hongbo; Wang, Wei; Zhang, Haina; Zhan, Tao (2009), Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (PDF), Lecture Notes in Computer Science, vol. 5479, Berlin, Heidelberg: Springer-Verlag, retrieved 15 June 2015

ietf.org (Global: 214th place; English: 176th place)

datatracker.ietf.org

keccak.team (Global: low place; English: low place)

  • Keccak team. "Keccak Team – Design and security". Retrieved 31 October 2019. Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key.

mathiasbynens.be (Global: low place; English: low place)

nist.gov (Global: 355th place; English: 454th place)

csrc.nist.gov

nist.gov

psu.edu (Global: 207th place; English: 136th place)

citeseerx.ist.psu.edu

  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). "Keying Hash Functions for Message Authentication" (PDF). pp. 1–15. CiteSeerX 10.1.1.134.8430.
  • Preneel, Bart; van Oorschot, Paul C. (1995), MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol. 963, Berlin-Heidelberg: Springer Verlag, CiteSeerX 10.1.1.34.3855
  • Preneel, Bart; van Oorschot, Paul C. (1995), On the Security of Two MAC Algorithms, CiteSeerX 10.1.1.42.8908

pthree.org (Global: low place; English: low place)

rfc-editor.org (Global: 6,184th place; English: 4,465th place)

schneier.com (Global: 8,888th place; English: 6,276th place)

  • Schneier, Bruce (August 2005). "SHA-1 Broken". Retrieved 9 January 2009. although it doesn't affect applications such as HMAC where collisions aren't important

ucsd.edu (Global: 1,933rd place; English: 1,342nd place)

cseweb.ucsd.edu

  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). "Keying Hash Functions for Message Authentication" (PDF). pp. 1–15. CiteSeerX 10.1.1.134.8430.
  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (Spring 1996). "Message Authentication using Hash Functions—The HMAC Construction" (PDF). CryptoBytes. 2 (1).

web.archive.org (Global: 1st place; English: 1st place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org