Fingerprint
Dive into the research topics of 'Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions'. Together they form a unique fingerprint.- Sort by
- Weight
- Alphabetically
Scott Contini, Yiqun Lisa Yin
Research output: Chapter in Book/Report/Conference proceeding › Conference proceeding contribution › peer-review