HMAC (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "HMAC" in English language version.

refsWebsite
Global rank English rank
214th place
176th place
2nd place
2nd place
207th place
136th place
355th place
454th place
5,032nd place
3,357th place
1,933rd place
1,342nd place
low place
low place
8,888th place
6,276th place
low place
low place
low place
low place
6,184th place
4,465th place
5th place
5th place

doi.org

iacr.org

eprint.iacr.org

iacr.org

ietf.org

datatracker.ietf.org

keccak.team

  • Keccak team. "Keccak Team – Design and security". Retrieved 31 October 2019. Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key.

mathiasbynens.be

nist.gov

csrc.nist.gov

nist.gov

psu.edu

citeseerx.ist.psu.edu

  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). "Keying Hash Functions for Message Authentication" (PDF). pp. 1–15. CiteSeerX 10.1.1.134.8430.
  • Preneel, Bart; van Oorschot, Paul C. (1995). "MDx-MAC and Building Fast MACs from Hash Functions". CiteSeerX 10.1.1.34.3855. {{cite journal}}: Cite journal requires |journal= (help)
  • Preneel, Bart; van Oorschot, Paul C. (1995). "On the Security of Two MAC Algorithms". CiteSeerX 10.1.1.42.8908. {{cite journal}}: Cite journal requires |journal= (help)

pthree.org

rfc-editor.org

schneier.com

  • Schneier, Bruce (August 2005). "SHA-1 Broken". Retrieved 9 January 2009. although it doesn't affect applications such as HMAC where collisions aren't important

ucsd.edu

cseweb.ucsd.edu

  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). "Keying Hash Functions for Message Authentication" (PDF). pp. 1–15. CiteSeerX 10.1.1.134.8430.
  • Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (Spring 1996). "Message Authentication using Hash Functions—The HMAC Construction" (PDF). CryptoBytes. 2 (1).

worldcat.org

search.worldcat.org