Second Preimages for Iterated Hash Functions and Their Implications on MACs
Вид публикации:
ReportИсточник:
12th Australasian Conference on Information Security and Privacy, ACIP 2007, Число LNCS, vol. 4586, p.68-81 (2007)- 7131 просмотр
- Google Scholar
- RTF
- EndNote XML