Length extension attack (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Length extension attack" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place

bostik.iki.fi

javacodegeeks.com

keccak.team

  • Keccak Team. "Strengths of Keccak - Design and security". Retrieved 2017-10-27. Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key.

packetstormsecurity.net

dl.packetstormsecurity.net

root.org

rdist.root.org

vudang.com

  • Vũ, Hoàng (2012-03-30). "MD5 Length Extension Attack Revisited - Vũ's Inner Peace". Archived from the original on 2014-10-29. Retrieved 2017-10-27.

web.archive.org

  • Vũ, Hoàng (2012-03-30). "MD5 Length Extension Attack Revisited - Vũ's Inner Peace". Archived from the original on 2014-10-29. Retrieved 2017-10-27.