Proceedings of the 3rd International Conference on Cryptography, Security and Privacy 2019
DOI: 10.1145/3309074.3309098
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced key generation algorithm of hashing message authentication code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Much studies have proposed different techniques to make HMAC more resistant against attacks especially exhaustive and birthday attacks. To determine how secured these techniques are, various assessments or evaluations such as avalanche effect, brute-force attack, randomness, and cryptanalysis were performed to provide validation of their performance [9], [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Much studies have proposed different techniques to make HMAC more resistant against attacks especially exhaustive and birthday attacks. To determine how secured these techniques are, various assessments or evaluations such as avalanche effect, brute-force attack, randomness, and cryptanalysis were performed to provide validation of their performance [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, this paper extends to measure and analyze the randomness test of our proposed key generation of HMAC-MD5 which is implemented to an existing application system [9].…”
Section: Introductionmentioning
confidence: 99%