Login / Signup
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
Hongbo Yu
Xiaoyun Wang
Published in:
ISPEC (2009)
Keyphrases
</>
machine learning
data structure
countermeasures
block cipher
recovery algorithm
similarity measure
artificial neural networks