Login / Signup

Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.

Changhoon LeeJongsung KimJaechul SungSeokhie HongSangjin Lee
Published in: ACISP (2006)
Keyphrases
  • digital images
  • countermeasures
  • database systems
  • traffic analysis
  • data sets
  • information systems
  • cooperative
  • jpeg images
  • block cipher
  • malicious users