Login / Signup

Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.

Hongbo YuXiaoyun Wang
Published in: ISPEC (2009)
Keyphrases
  • machine learning
  • data structure
  • countermeasures
  • block cipher
  • recovery algorithm
  • similarity measure
  • artificial neural networks