<--- Back to Details
First PageDocument Content
Cryptography / Message authentication codes / Error detection and correction / Cryptographic hash functions / Hashing / HMAC / Hash function / MD5 / GOST / SHA-1 / Checksum / UMAC
Date: 2018-06-14 07:12:35
Cryptography
Message authentication codes
Error detection and correction
Cryptographic hash functions
Hashing
HMAC
Hash function
MD5
GOST
SHA-1
Checksum
UMAC

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 578,22 KB

Share Document on Facebook

Similar Documents

Performance Evaluation of Checksum-Based ABFT∗ Ahmad A. Al-Yamani, Nahmsuk Oh and Edward J. McCluskey Center for Reliable Computing – Stanford University, Stanford, California {alyamani, nsoh, } A

Performance Evaluation of Checksum-Based ABFT∗ Ahmad A. Al-Yamani, Nahmsuk Oh and Edward J. McCluskey Center for Reliable Computing – Stanford University, Stanford, California {alyamani, nsoh, } A

DocID: 1v9xy - View Document

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

DocID: 1rjKP - View Document

EMD Release Status Review  October 6, EMD-001 October 6, 2004

EMD Release Status Review October 6, EMD-001 October 6, 2004

DocID: 1r8cL - View Document

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger  Michael K. Reiter

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

DocID: 1r7EO - View Document

SARSAT Beacon Manufacturer’s Workshop September 28, 2012 Regulatory and Type Approval Changes Prepared by: Jesse Reich/NOAA

SARSAT Beacon Manufacturer’s Workshop September 28, 2012 Regulatory and Type Approval Changes Prepared by: Jesse Reich/NOAA

DocID: 1qVKl - View Document