Popular attacks on cryptographic hash algorithms are "birthday attacks" . At high level ,
if a hash function produces $n$ bits of output, an attacker who computes only $2^{n/2}$ hash operations on random input is likely to find two matching outputs
Is the same true for HMAC ? Or are HMAC with any underlying Hashing (like MD5/SHA-2) prone to birthday attacks ? If not why not ?
Note : this question is not a duplicate of What are the implications of a birthday attack on a HMAC?