Login / Signup
Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5.
Wei Wang
Published in:
ISA (2011)
Keyphrases
</>
database
case study
neural network
information retrieval
anomaly detection
countermeasures