1. [1] Y. Sasaki and L. Wang, “Generic attacks on strengthened HMAC: n-bit secure HMAC requires key in all blocks,” Security and Cryptography for Networks, Lecture Notes in Computer Science, vol.8642, pp.324-339, Springer, 2014.
2. [2] R. Perlner, “Special publication on KMAC.” Presented in NIST SHA3 workshop, 2014. http://csrc.nist.gov/groups/ST/hash/sha-3/Aug2014/
3. [3] G. Tsudik, “Message authentication with one-way hash functions,” Proc. IEEE INFOCOM'92: The Conference on Computer Communications, vol.3, pp.2055-2059, 1992.
4. [4] M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” Advances in Cryptology — CRYPTO'96, Lecture Notes in Computer Science, vol.1109, pp.1-15, Springer, 1996.
5. [5] U.S. Department of Commerce, National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code (HMAC) (Federal Information Processing Standards Publication 198), July 2008. http://csrc.nist.gov/publications/fips/fips198-1/FIPS-198-1_final.pdf