"On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 ..."

Jongsung Kim et al. (2006)

Details and statistics

DOI: 10.1007/11832072_17

access: closed

type: Conference or Workshop Paper

metadata version: 2020-10-25

a service of  Schloss Dagstuhl - Leibniz Center for Informatics