Results 161 to 170 of about 44,375 (171)
Some of the next articles are maybe not open access.
Generic Universal Forgery Attack on Iterative Hash-Based MACs
Lecture Notes in Computer Science, 2014Thomas Peyrin
exaly
Differential properties of authenticated encryption mode based on universal hash function (XTSMAC)
2021exaly
A Novel Probabilistic Image Authentication Methodbased on Universal Hash Function for Rgb Images
2018Fatih Ozyurt +2 more
exaly
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Lecture Notes in Computer Science, 2016exaly
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Lecture Notes in Computer ScienceBart Preneel
exaly

