Analysis of information sources in references of the Wikipedia article "HMAC" in Persian language version.
{{cite journal}}
: Cite journal requires |journal=
(help); Unknown parameter |coauthors=
ignored (|author=
suggested) (help)نگهداری CS1: پست اسکریپت (link)The strongest attack known against HMAC is based on the frequency of collisions for the hash function H («birthday attack») [PV,BCK2], and is totally impractical for minimally reasonable hash functions.
{{cite web}}
: نگهداری CS1: پست اسکریپت (link){{cite web}}
: نگهداری CS1: پست اسکریپت (link){{cite web}}
: نگهداری CS1: پست اسکریپت (link)although it doesn't affect applications such as HMAC where collisions aren't important
This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised.
{{cite conference}}
: نگهداری یادکرد:تاریخ و سال (link){{cite web}}
: نگهداری CS1: پست اسکریپت (link){{cite web}}
: نگهداری CS1: پست اسکریپت (link)This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised.
{{cite conference}}
: نگهداری یادکرد:تاریخ و سال (link){{cite journal}}
: Cite journal requires |journal=
(help); Unknown parameter |coauthors=
ignored (|author=
suggested) (help)نگهداری CS1: پست اسکریپت (link)