Talk:HMAC/to do

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
  • Describe the actual construction.
  • Describe how the security of HMAC relates to the underlying hash function.
  • Describe the advantages of using HMAC over the underlying hash.