Security of HMAC and Pseudo Random Functions are discussed.
Topic 1: Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC
Authors: Yusuke Naito and Lei Wang
Topic 2: Constrained PRFs for Unbounded Inputs
Authors: Hamza Abusalah, Georg Fuchsbauer and Krzysztof Pietrzak