Star 0

Abstract

Security of HMAC and Pseudo Random Functions are discussed.

Topic 1: Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC
Authors: Yusuke Naito and Lei Wang

Topic 2: Constrained PRFs for Unbounded Inputs
Authors: Hamza Abusalah, Georg Fuchsbauer and Krzysztof Pietrzak