Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
From MaRDI portal
Publication:4550256
Recommendations
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
- scientific article; zbMATH DE number 1759778
- scientific article; zbMATH DE number 2043327
- New Distinguishing Attack on MAC Using Secret-Prefix Method
- Partial key recovery attack against RMAC
- Almost universal forgery attacks on AES-based MAC's
- Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
- New Birthday Attacks on Some MACs Based on Block Ciphers
Cited in
(4)
This page was built for publication: Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4550256)