I. Dinur and G. Leurent, Improved Generic Attacks against Hash-Based MACs and HAIFA, Lecture Notes in Computer Science, vol.1, issue.8616, pp.149-168, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01407953

T. Fuhr, G. Leurent, and V. Suder, Collision Attacks Against CAESAR Candidates, Advances in Cryptology -ASIACRYPT 2015. Lecture Notes in Computer Science, 2015.
DOI : 10.1007/978-3-662-48800-3_21

URL : https://hal.archives-ouvertes.fr/hal-01102031

J. Guo, T. Peyrin, Y. Sasaki, and L. Wang, Updates on Generic Attacks against HMAC and NMAC, Lecture Notes in Computer Science, vol.1, issue.8616, pp.131-148, 2014.
DOI : 10.1007/978-3-662-44371-2_8

K. Jia, X. Wang, Z. Yuan, and G. Xu, Distinguishing and Second-Preimage Attacks on CBC-Like MACs, Lecture Notes in Computer Science, vol.5888, pp.349-361, 2009.
DOI : 10.1007/978-3-642-10433-6_23

C. Lee, J. Kim, J. Sung, S. Hong, and S. Lee, Forgery and Key Recovery Attacks on PMAC and Mitchell???s TMAC Variant
DOI : 10.1007/11780656_35

G. Leurent, T. Peyrin, and L. Wang, New Generic Attacks against Hash-Based MACs, Lecture Notes in Computer Science, vol.8270, issue.2, pp.1-20, 2013.
DOI : 10.1007/978-3-642-42045-0_1

T. Peyrin and L. Wang, Generic Universal Forgery Attack on Iterative Hash-Based MACs, Lecture Notes in Computer Science, vol.8441, pp.147-164, 2014.
DOI : 10.1007/978-3-642-55220-5_9

B. Preneel and P. C. Van-oorschot, MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol.963, pp.1-14, 1995.
DOI : 10.1007/3-540-44750-4_1

B. Preneel and P. C. Van-oorschot, On the Security of Two MAC Algorithms, Lecture Notes in Computer Science, vol.1070, pp.19-32, 1996.
DOI : 10.1007/3-540-68339-9_3