Login / Signup
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
Eunjin Lee
Donghoon Chang
Jongsung Kim
Jaechul Sung
Seokhie Hong
Published in:
FSE (2008)
Keyphrases
</>
countermeasures
block cipher
attack detection
cyber attacks
differential power analysis
hash functions
detect malicious
attack graphs
data corruption
fault injection
malicious users
attack graph
network intrusion
denial of service
denial of service attacks
security risks
dos attacks