Login / Signup
New Generic Attacks against Hash-Based MACs.
Gaëtan Leurent
Thomas Peyrin
Lei Wang
Published in:
ASIACRYPT (2) (2013)
Keyphrases
</>
countermeasures
transitive closure
security protocols
wireless sensor networks
data distribution
neural network
data mining
website
sensor networks
digital images
hash functions
join algorithms
ddos attacks
terrorist attacks
malicious users