Login / Signup
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes.
Gordon Procter
Carlos Cid
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
chosen message
authentication scheme
secret key
digital images
key agreement
countermeasures
database schemes
denial of service attacks
malicious attacks
sensor networks
hash functions
security threats