On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes. / Procter, Gordon; Cid, Carlos.

Fast Software Encryption, 20th International Workshop, FSE 2013. Vol. 8424 Springer, 2013. p. 287-304 (Lecture Notes in Computer Science - LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published
Original languageEnglish
Title of host publicationFast Software Encryption, 20th International Workshop, FSE 2013
PublisherSpringer
Pages287-304
Number of pages18
Volume8424
ISBN (Electronic)978-3-662-43933-3
ISBN (Print)978-3-662-43932-6
DOIs
Publication statusPublished - 2013
EventFSE 2013 - Singapore, Singapore
Duration: 10 Mar 201313 Mar 2013

Publication series

NameLecture Notes in Computer Science - LNCS
PublisherSpringer

Workshop

WorkshopFSE 2013
CountrySingapore
CitySingapore
Period10/03/1313/03/13
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 16948903