Login / Signup
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.
Helena Handschuh
Bart Preneel
Published in:
CRYPTO (2008)
Keyphrases
</>
hash functions
block cipher
pattern recognition
data analysis
multiresolution
hash tables
stream cipher