HMAC (Turkish Wikipedia)

Analysis of information sources in references of the Wikipedia article "HMAC" in Turkish language version.

refsWebsite
Global rank Turkish rank
1st place
1st place
207th place
424th place
214th place
1,248th place
5,032nd place
low place
low place
low place
8,888th place
low place
1,933rd place
2,448th place

iacr.org

eprint.iacr.org

iacr.org

ietf.org

datatracker.ietf.org

  • RFC 2104, section 2, "Definition of HMAC", page 3.

ietf.org

  • IETF (Şubat 1997). "RFC 2104". 29 Kasım 2016 tarihinde kaynağından arşivlendi. Erişim tarihi: 3 Aralık 2009. The strongest attack known against HMAC is based on the frequency of collisions for the hash function H ("birthday attack") [PV,BCK2], and is totally impractical for minimally reasonable hash functions. 

tools.ietf.org

noekeon.org

keccak.noekeon.org

  • Keccak team. "Strengths of Keccak - Design and security". 6 Haziran 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 30 Ocak 2013. Unlike SHA-1 and SHA-2, Keccak does not have the length-extension weakness, hence does not need the HMAC nested construction. Instead, MAC computation can be performed by simply prepending the message with the key. 

psu.edu

citeseerx.ist.psu.edu

schneier.com

  • Bruce Schneier (Ağustos 2005). "SHA-1 Broken". 26 Haziran 2017 tarihinde kaynağından arşivlendi. Erişim tarihi: 9 Ocak 2009. although it doesn't affect applications such as HMAC where collisions aren't important 

ucsd.edu

cseweb.ucsd.edu

  • Bellare, Mihir (Haziran 2006). "New Proofs for NMAC and HMAC: Security without Collision-Resistance". Dwork, Cynthia (Ed.). Advances in Cryptology – Crypto 2006 Proceedings. Lecture Notes in Computer Science 4117. Springer-Verlag. 16 Temmuz 2011 tarihinde kaynağından arşivlendi. Erişim tarihi: 25 Mayıs 2010. This paper proves that HMAC is a PRF under the sole assumption that the compression function is a PRF. This recovers a proof based guarantee since no known attacks compromise the pseudorandomness of the compression function, and it also helps explain the resistance-to-attack that HMAC has shown even when implemented with hash functions whose (weak) collision resistance is compromised. 

web.archive.org