Login / Signup

Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.

Scott ContiniYiqun Lisa Yin
Published in: ASIACRYPT (2006)
Keyphrases
  • digital images
  • block cipher
  • hash functions
  • data structure
  • countermeasures
  • neural network
  • mobile robot
  • security protocols
  • recovery algorithm