Talk:HMAC/to do

From Wikipedia, the free encyclopedia

  • Describe the actual construction.
  • Describe how the security of HMAC relates to the underlying hash function.
  • Describe the advantages of using HMAC over the underlying hash.