Second Preimages for Iterated Hash Functions and Their Implications on MACs

Тип публикация:

Report

Източник:

12th Australasian Conference on Information Security and Privacy, ACIP 2007, Число LNCS, vol. 4586, p.68-81 (2007)
Share/Save
Последно обновяване: понеделник, 03 February 2014