Login / Signup
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes.
Markku-Juhani Olavi Saarinen
Published in:
FSE (2012)
Keyphrases
</>
countermeasures
random projections
security mechanisms
malicious attacks
simplex method
computer security
denial of service attacks
attack detection
security threats
traffic analysis
terrorist attacks
pattern matching
information security
low order