Login / Signup
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
Scott Contini
Yiqun Lisa Yin
Published in:
IACR Cryptol. ePrint Arch. (2006)
Keyphrases
</>
digital images
countermeasures
hash functions
security mechanisms
traffic analysis
denial of service attacks
attack detection