Login / Signup

Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5.

Wei Wang
Published in: ISA (2011)
Keyphrases
  • database
  • case study
  • neural network
  • information retrieval
  • anomaly detection
  • countermeasures