The following publications are possibly variants of this publication:
- Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 RoundsJian Guo 0001, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen. iacr, 2015:75, 2015. [doi]
- Cryptanalysis of HMAC/NMAC-WhirlpoolJian Guo 0001, Yu Sasaki, Lei Wang, Shuang Wu. asiacrypt 2013: 21-40 [doi]
- Cryptanalysis of HMAC/NMAC-WhirlpoolJian Guo 0001, Yu Sasaki, Lei Wang, Shuang Wu. iacr, 2015:149, 2015. [doi]
- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVALHongbo Yu, Xiaoyun Wang. ispec 2009: 285-297 [doi]
- Updates on Generic Attacks against HMAC and NMACJian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang. crypto 2014: 131-148 [doi]
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMACYusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda. IWSEC 2013: 83-98 [doi]
- A Full Key Recovery Attack on HMAC-AURORA-512Yu Sasaki. iacr, 2009:125, 2009. [doi]
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5Lei Wang, Kazuo Ohta, Noboru Kunihiro. eurocrypt 2008: 237-253 [doi]