Login / Signup

Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.

Pierre-Alain FouqueGaëtan LeurentPhong Q. Nguyen
Published in: CRYPTO (2007)
Keyphrases
  • case study
  • recovery algorithm
  • cooperative
  • information systems
  • malicious attacks