@inproceedings{cba658af3b0e48019d3cedd2d06edfe7,
title = "Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions",
abstract = "In this paper, we analyze the security of HMAC and NMAC, both of which are hash-based message authentication codes. We present distinguishing, forgery, and partial key recovery attacks on HMAC and NMAC using collisions of MD4, MD5, SHA-0, and reduced SHA-1. Our results demonstrate that the strength of a cryptographic scheme can be greatly weakened by the insecurity of the underlying hash function.",
author = "Scott Contini and Yin, {Yiqun Lisa}",
year = "2006",
doi = "10.1007/11935230_3",
language = "English",
isbn = "3540494758",
series = "Lecture notes in computer science",
publisher = "Springer, Springer Nature",
pages = "37--53",
editor = "Xuejia Lai and Kefei Chen",
booktitle = "Advances in cryptology - ASIACRYPT 2006",
address = "United States",
note = "International Conference on the Theory and Application of Cryptology and Information Security (12th : 2006) ; Conference date: 03-12-2006 Through 07-12-2006",
}