Talk:HMAC/to do
Jump to navigation
Jump to search
Describe the actual construction.- Describe how the security of HMAC relates to the underlying hash function.
Describe the advantages of using HMAC over the underlying hash.