Cryptology ePrint Archive: Report 2013/144

Available versions in chronological order


On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013

On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013

On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013


[ Cryptology ePrint archive ]