Back to Results
First PageMeta Content
Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing


SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a
Add to Reading List

Document Date: 2013-11-05 02:27:57


Open Document

File Size: 68,80 KB

Share Result on Facebook

Country

China / /

Facility

Shandong University / /

Organization

Shandong University in China / IETF / /

Person

Lisa Yin / /

Technology

Digital Signature / SSL / secret key / HMAC OTP algorithm / Secure Hash Algorithm / /

SocialTag