Login / Signup
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.
Gaoli Wang
Shaohui Wang
Published in:
AFRICACRYPT (2009)
Keyphrases
</>
block cipher
countermeasures
attack detection
malicious users
data sets
artificial intelligence
social networks
information systems
lightweight
ddos attacks
digital watermark
attack graph
attack graphs