Login / Signup

New Birthday Attacks on Some MACs Based on Block Ciphers.

Zheng YuanWei WangKeting JiaGuangwu XuXiaoyun Wang
Published in: CRYPTO (2009)
Keyphrases
  • block cipher
  • lightweight
  • s box
  • hash functions
  • secret key
  • power analysis
  • application layer
  • feature extraction
  • similarity measure
  • cost effective
  • security protocols