SHA-3 proposal BLAKE. Submission to NIST, 2008. ,
BLAKE2: Simpler, Smaller, Fast as MD5, ACNS. Lecture Notes in Computer Science, vol.7954, pp.119-135, 2013. ,
DOI : 10.1007/978-3-642-38980-1_8
New Proofs for NMAC and HMAC: Security Without Collision-Resistance, Lecture Notes in Computer Science, vol.4117, pp.602-619, 2006. ,
DOI : 10.1007/11818175_36
Keying Hash Functions for Message Authentication, Lecture Notes in Computer Science, vol.1109, pp.1-15, 1996. ,
DOI : 10.1007/3-540-68697-5_1
A Framework for Iterative Hash Functions -HAIFA. IACR Cryptology ePrint Archive, Report, p.278, 2007. ,
Improved Generic Attacks against Hash-Based MACs and HAIFA, pp.149-168 ,
DOI : 10.1007/s00453-016-0236-6
URL : https://hal.archives-ouvertes.fr/hal-01407953
11-2012: Hash Function, GOST R RFCInformational ), vol.34, issue.6986, 2013. ,
The Skein hash function family, 2008. ,
Random Mapping Statistics, Proceedings. Lecture Notes in Computer Science, vol.434, pp.329-354, 1989. ,
DOI : 10.1007/3-540-46885-4_34
URL : https://hal.archives-ouvertes.fr/inria-00075445
Advances in Cryptology -CRYPTO 2014 -34th Annual Cryptology Conference, Proceedings, Part I, 2014. ,
Updates on Generic Attacks against HMAC and NMAC, pp.131-148 ,
DOI : 10.1007/978-3-662-44371-2_8
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds, Fast Software Encryption -21st International Workshop, FSE 2014, pp.571-590, 2014. ,
DOI : 10.1007/978-3-662-46706-0_29
Cryptanalysis of HMAC/NMAC-Whirlpool, pp.21-40 ,
DOI : 10.1007/978-3-642-42045-0_2
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Lecture Notes in Computer Science, vol.3152, pp.306-316, 2004. ,
DOI : 10.1007/978-3-540-28628-8_19
Herding Hash Functions and the Nostradamus Attack, Lecture Notes in Computer Science, vol.4004, pp.183-200, 2006. ,
DOI : 10.1007/11761679_12
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work, Lecture Notes in Computer Science, vol.3494, pp.474-490, 2005. ,
DOI : 10.1007/11426639_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.9667
On Diamond Structures and Trojan Message Attacks, pp.524-539 ,
DOI : 10.1007/978-3-642-42045-0_27
New Generic Attacks against Hash-Based MACs, IACR Cryptology ePrint Archive, vol.2014, issue.406, p.406, 2014. ,
DOI : 10.1007/978-3-642-42045-0_1
New Generic Attacks against Hash-Based MACs, Sako and Sarkar [25], pp.1-20 ,
DOI : 10.1007/978-3-642-42045-0_1
64.4 Some Logarithm Inequalities, The Mathematical Gazette, vol.64, issue.427, pp.55-57, 1980. ,
DOI : 10.2307/3615890
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC, Lecture Notes in Computer Science, vol.8231, pp.83-98, 2013. ,
DOI : 10.1007/978-3-642-41383-4_6
Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, vol.12, issue.1, pp.1-28, 1999. ,
DOI : 10.1007/PL00003816
Generic Related-Key Attacks for HMAC, ASIACRYPT. Lecture Notes in Computer Science, vol.7658, pp.580-597, 2012. ,
DOI : 10.1007/978-3-642-34961-4_35
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.6051
Generic Universal Forgery Attack on Iterative Hash-Based MACs, Advances in Cryptology -EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.147-164, 2014. ,
DOI : 10.1007/978-3-642-55220-5_9
Message authentication with one-way hash functions, ACM SIGCOMM Computer Communication Review, vol.22, issue.5, pp.29-38, 1992. ,
DOI : 10.1145/141809.141812
???Sandwich??? Is Indeed Secure: How to Authenticate a Message with Just One Hashing, ACISP. Lecture Notes in Computer Science, vol.4586, pp.355-369, 2007. ,
DOI : 10.1007/978-3-540-73458-1_26