Login / Signup

Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.

Gaoli WangShaohui Wang
Published in: AFRICACRYPT (2009)
Keyphrases
  • block cipher
  • countermeasures
  • attack detection
  • malicious users
  • data sets
  • artificial intelligence
  • social networks
  • information systems
  • lightweight
  • ddos attacks
  • digital watermark
  • attack graph
  • attack graphs