<--- Back to Details
First PageDocument Content
Cryptography / Message authentication codes / Error detection and correction / Cryptographic hash functions / Hashing / HMAC / Hash function / MD5 / GOST / SHA-1 / Checksum / UMAC
Date: 2018-06-14 07:12:35
Cryptography
Message authentication codes
Error detection and correction
Cryptographic hash functions
Hashing
HMAC
Hash function
MD5
GOST
SHA-1
Checksum
UMAC

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 578,22 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document