Login / Signup
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity.
Donghoon Chang
Mridul Nandi
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
countermeasures
special case
dos attacks
malicious attacks
malicious users
worst case
ddos attacks
block cipher
computational complexity
security issues
attack detection
denial of service
data corruption
injection attacks