all InfoSec news
Keyed Streebog is a secure PRF and MAC
July 30, 2022, 2:12 p.m. |
IACR News www.iacr.org
ePrint Report: Keyed Streebog is a secure PRF and MAC
Vitaly Kiryukhin
One of the most popular ways to turn a keyless hash function into a keyed one is the HMAC algorithm. This approach is too expensive in some cases due to double hashing. Excessive overhead can sometimes be avoided by using certain features of the hash function itself. The paper presents a simple and safe way to create a keyed cryptoalgorithm (conventionally called "Streebog-K") from hash function Streebog $\mathsf{H}(M)$. …
More from www.iacr.org / IACR News
ICMS ZKP Workshop: Foundations and Applications of Zero-Knowledge Proofs
1 day, 10 hours ago |
www.iacr.org
RWC 2025: Real World Crypto Symposium
1 day, 10 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cyber Threat Analyst
@ Peraton | Morrisville, NC, United States
Kyndryl Offensive Security Professional - Threat-Led Penetration Testing (TLPT) and Red Teaming
@ Kyndryl | Sao Paulo (KBR51645) WeWork Office
Consultant en Cyber Sécurité - Spécialiste PKI H/F
@ Devoteam | Levallois-Perret, France
Cloud Security Architect - Advisor (Remote)
@ Fannie Mae | Reston, VA, United States
OT Cybersecurity Engineer
@ SBM Offshore | Bengaluru, IN, 560071