Login / Signup
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs.
Keting Jia
Xiaoyun Wang
Zheng Yuan
Guangwu Xu
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
countermeasures
database
evolutionary algorithm
feature selection
bayesian networks
authentication protocol
detection mechanism
power analysis
fault model