"Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash ..."

Scott Contini, Yiqun Lisa Yin (2006)

Details and statistics

DOI:

access: open

type: Informal or Other Publication

metadata version: 2020-05-11

a service of  Schloss Dagstuhl - Leibniz Center for Informatics