Login / Signup

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.

Gordon ProcterCarlos Cid
Published in: FSE (2013)
Keyphrases