On weak keys and forgery attacks against polynomial-based MAC schemes

From MaRDI portal
Publication:901368








Describes a project that uses

Uses Software





This page was built for publication: On weak keys and forgery attacks against polynomial-based MAC schemes

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q901368)