Login / Signup

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.

Hongbo YuXiaoyun Wang
Published in: ACISP (2009)
Keyphrases
  • secret key
  • post processing
  • data structure
  • hash functions
  • countermeasures
  • lightweight
  • secret sharing
  • malicious users