C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1.
Siyuan Qiao
Wei Wang
Keting Jia
Published in:
ICISC (2009)
Keyphrases
</>
secret key
hash functions
data structure
countermeasures
detection mechanism
attack scenarios