Practical attack on NLM-MAC scheme
From MaRDI portal
Publication:2015149
DOI10.1016/J.IPL.2014.04.010zbMATH Open1371.94653OpenAlexW2029755281WikidataQ59484953 ScholiaQ59484953MaRDI QIDQ2015149FDOQ2015149
Josef Pieprzyk, Ron Steinfeld, Mohammad Ali Orumiehchiha
Publication date: 23 June 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/82449/8/82449.pdf
Cites Work
Cited In (1)
Recommendations
- Title not available (Why is that?) π π
- New Distinguishing Attack on MAC Using Secret-Prefix Method π π
- Updates on Generic Attacks against HMAC and NMAC π π
- New Generic Attacks against Hash-Based MACs π π
- Improved Generic Attacks against Hash-Based MACs and HAIFA π π
- Generic attacks against beyond-birthday-bound MACs π π
- Improved generic attacks against hash-based MACs and HAIFA π π
- Key-Recovery Attacks Against the MAC Algorithm Chaskey π π
- Attacks on the ESA-PSS-04-151 MAC Scheme π π
This page was built for publication: Practical attack on NLM-MAC scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2015149)