Login / Signup
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1.
Siyuan Qiao
Wei Wang
Keting Jia
Published in:
ICISC (2009)
Keyphrases
</>
secret key
hash functions
data structure
countermeasures
detection mechanism
attack scenarios