Truncation attacks on MACs

Research output: Contribution to journalArticlepeer-review

242 Downloads (Pure)
Original languageEnglish
Pages (from-to)1439-1440
Number of pages2
JournalElectronics Letters
Volume39
Issue number20
DOIs
Publication statusPublished - Jun 2003

Keywords

  • security systems
  • cipher
  • authentication
  • hardware

Cite this