Login / Signup
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
Hongbo Yu
Xiaoyun Wang
Published in:
ACISP (2009)
Keyphrases
</>
secret key
post processing
data structure
hash functions
countermeasures
lightweight
secret sharing
malicious users