References
- Z.E. Rasjid, B. Soewito, G. Witjaksono, E. Abdurachman, A review of collisions in cryptographic hash function used in digital forensic tools, Procedia computer science, volume 116, 2017, 381-392, DOI: https://doi.org/https://doi.org/10.1016/j.procs.2017.10.072.
- G. Kessler , The impact of MD5 file hash collisions on digital forensic imaging, Journal of digital forensics, security and law, volume 11, issue 4, article 9, 2016, 129-138, DOI: https://doi.org/https://doi.org/10.15394/jdfsl.2016.1431.
- Y. Luo, X. Lai, T. Jia, Attacks on a double length block cipher-based hash proposal, Cryptography and communications, volume 7, issue 3, 2015, 289-295, DOI: https://doi.org/https://doi.org/10.1007/s12095-014-0117-2.
- J.S. Coron, Y. Dodis, C. Malinaud, P. Punia, Merkle–Damgård revisited: how to construct a hash function, Advances of cryptology, Crypto 2005, Part of the lecture notes in computer science book series (LNCS, volume 3621), 2005, 430-448, DOI: https://doi.org/https://doi.org/10.1007/11535218_26.
- T. Peyrin, Y. Sasaki, L. Wang, Generic related-key attacks for HMAC, International conference on the theory and application of cryptology and information security, ASIACRYPT 2012: Advances in cryptology – ASIACRYPT 2012, 580-597, DOI: https://doi.org/https://doi.org/10.1007/978-3-642-34961-4_35.
- S. Belaid, L. Bettale, E. Dottax, L. Genelle, F. Rondepierre, Differential power analysis of HMAC SHA-2 in the hamming weight model, 2013 International conference on security and cryptography (SECRYPT), 2013, available at https://www.di.ens.fr/~belaid/articleHMAC.pdf.
- J. Guo, T. Peyrin, Y. Sasaki, L. Wang, Updates on generic attacks against HMAC and NMAC, Annual cryptology conference, CRYPTO 2014: Advances in cryptology-Crypto 2014, 131-148, DOI: https://doi.org/https://doi.org/10.1007/978-3-662-44371-2_8.
- S. Yakut, A.B. Ozer, HMAC based one time password generator, 22nd signal processing and communications applications conference (SIU), 23-25 April 2014, Turkey, DOI: https://doi.org/10.1109/SIU.2014.6830541.
- A. Esfahani, D. Yang, G. Mantas, Dual homomorphic message authentication code scheme for network coding-enabled wireless sensor networks, volume 11, issue 7, 2015, DOI: https://doi.org/https://doi.org/10.1155/2015/510251.
- Y. Naito, L. Wang, Replacing SHA-2 with SHA-3 enhances generic security of HMAC, Proceedings of the RSA conference on topics in cryptology - CT-RSA, volume 9610, 2016, 397-412, DOI: https://doi.org/10.1007/978-3-319-29485-8_23.
- J. Li, L. Wu, X. Zhang, High-performance implementation of an HMAC processor based on SHA-3 hash function, 2017 International conference on electron devices and solid-state circuits (EDSSC), Taiwan, 18-20 October 2017, DOI: https://doi.org/10.1109/EDSSC.2017.8126543.
- E. Dubrova, M. Naslund, G. Selander, F. Lindqvist, Message authentication based on cryptographically secure CRC without polynomial irreducibility test, Cryptography and communications, volume 10, issue 2, March 2018, 383-399, DOI: https://doi.org/https://doi.org/10.1007/s12095-017-0227-8.
- E.G. Abad, A.M. Sison, Enhanced key generation algorithm of hashing message authentication code, Proceedings of the 3rd international conference on cryptography, security and privacy, Kuala Lumpur, Malaysia, January 19-21, 2019, 44-48, DOI: doi:https://doi.org/10.1145/3309074.3309098.
- A. Shakya, N. Karna Enhancing MD5 hash algorithm using symmetric key encryption, Proceedings of the 3rd international conference on cryptography, security and privacy, Kuala Lumpur, Malaysia, January 19 - 21, 2019, 18-22, DOI: https://doi.org/10.1145/3309074.3309087.
- V. Shukla, A. Chaturvedi, N. Srivastava, A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography, Communications on applied electronics, volume 3, number 3, 2015, 16-21, DOI: https://doi.org/10.5120/cae2015651903.
- V. Shukla, N. Srivastava, A. Chaturvedi, A bit commitment signcryption protocol for wireless transport layer security (WTLS), IEEE Uttar Pradesh section international conference on electrical, computer and electronics engineering (UPCON), 2016, 83-86, DOI: https://doi.org/10.1109/UPCON.2016.7894629.
- C. Dobraunig, M. Eichlseder, F. Mendel, Analysis of SHA-512/224 and SHA-512/256, International conference on the theory and application of cryptology and information security, ASIACRYPT 2015: Advances in cryptology – ASIACRYPT 2015, 612-630, Part of the lecture notes in computer science book series (LNCS, volume 9453), DOI: https://doi.org/https://doi.org/10.1007/978-3-662-48800-3_25.
- A. Joux, A. Odlyzko, C. Pierrot, The past, evolving present and future of discrete logarithm, Open problems in mathematics and computational science, 2014, 5-36, DOI: https://doi.org/https://doi.org/10.1007/978-3-319-10683-0_2.
- A. Kush, P. Gupta, R. Kumar, Performance evaluation of associative based routing in Adhoc networks, Journal of Interdisciplinary Mathematics, volume 9, issue 2, 2006, 347-361, DOI: https://doi.org/https://doi.org/10.1080/09720502.2006.10700448
- H. Jin, A. Wang, Y. Zhu, Network security of low power wireless router based on clustering routing algorithm, Journal of Interdisciplinary Mathematics, volume 21, issue 5, 2018, 1221-1225, DOI: https://doi.org/https://doi.org/10.1080/09720502.2018.1495229