![Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation](https://www.pdfsearch.io/img/e770347ea2b683a37d706f450ad58c44.jpg)
| Document Date: 2002-12-02 19:59:21 Open Document File Size: 171,05 KBShare Result on Facebook
City La Jolla / / Company AES / Knudsen / / Event FDA Phase / / IndustryTerm generation algorithm / ePrint server / Internet users / exhaustive key search / verification algorithm / exhaustive search / / Organization Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department / / Person Tadayoshi Kohno / Chris Mitchell / / Position intended correspondent / / Product Lu2 / K2v / L1 / K2u / / ProvinceOrState California / / Technology The RMAC verification algorithm / verification algorithm / block cipher / three algorithms / RMAC algorithm / k-bit key K. The RMAC algorithm / tagging algorithm / key generation algorithm / RMAC tagging algorithm / SSL / /
SocialTag |