Sciweavers

CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
14 years 1 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel