Login / Signup
Generic Universal Forgery Attack on Iterative Hash-based MACs.
Thomas Peyrin
Lei Wang
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
digital images
data sets
high level
detection mechanism
neural network
domain specific
hash functions
countermeasures
database
data mining
wireless sensor networks
transitive closure
denial of service attacks
index tree