Login / Signup
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
Scott Contini
Yiqun Lisa Yin
Published in:
ASIACRYPT (2006)
Keyphrases
</>
digital images
block cipher
hash functions
data structure
countermeasures
neural network
mobile robot
security protocols
recovery algorithm