Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
From MaRDI portal
Publication:4550256
DOI10.1007/3-540-45325-3_7zbMATH Open0999.94553OpenAlexW1535109797MaRDI QIDQ4550256FDOQ4550256
Authors: Karl Brincat, Chris J. Mitchell
Publication date: 2 December 2002
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45325-3_7
Recommendations
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- scientific article; zbMATH DE number 1759778
- scientific article; zbMATH DE number 2043327
- New Distinguishing Attack on MAC Using Secret-Prefix Method
- Partial key recovery attack against RMAC
- Almost universal forgery attacks on AES-based MAC's
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Birthday Attacks on Some MACs Based on Block Ciphers
cryptanalysismessage authentication codes (MACs)chaining variablescryptographic application program interfaces
Cited In (4)
This page was built for publication: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550256)