Login / Signup
New Generic Attacks Against Hash-based MACs.
Gaëtan Leurent
Thomas Peyrin
Lei Wang
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
countermeasures
malicious attacks
watermarking scheme
high level
hash functions
transitive closure
computer security
traffic analysis
data structure
domain specific
security threats