Cryptography and Network Security (4th Edition)

[Page 374 (continued)]

12.5. Recommended Reading and Web Sites

[GILB03] examines the security of SHA-256 through SHA-512. Overviews of HMAC can be found in [BELL96a] and [BELL96b].

BELL96a Bellare, M.; Canetti, R.; and Krawczyk, H. "Keying Hash Functions for Message Authentication." Proceedings, CRYPTO '96, August 1996; published by Springer-Verlag. An expanded version is available at http://www-cse.ucsd.edu/users/mihir.

BELL96b Bellare, M.; Canetti, R.; and Krawczyk, H. "The HMAC Construction." CryptoBytes, Spring 1996.

GILB03 Gilbert, H. and Handschuh, H. "Security Analysis of SHA-256 and Sisters." "Proceedings, CRYPTO '03, 2003; published by Springer-Verlag.

Recommended Web Sites

  • NIST Secure Hashing Page: SHA FIPS and related documents

  • Whirlpool: Range of information on Whirlpool

  • Block cipher modes of operation: NIST page with full information on CMAC

Категории