Cited By
View all- Luykx APreneel BSzepieniec AYasuda K(2016)On the Influence of Message Length in PMAC's Security BoundsProceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 966510.5555/3081770.3081793(596-621)Online publication date: 8-May-2016
- Dutta ANandi MPaul G(2016)One-Key Compression Function Based MAC with Security Beyond Birthday BoundProceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy - Volume 972210.1007/978-3-319-40253-6_21(343-358)Online publication date: 4-Jul-2016
- Oswald D(2015)Side-Channel Attacks on SHA-1-Based Product Authentication ICsRevised Selected Papers of the 14th International Conference on Smart Card Research and Advanced Applications - Volume 951410.1007/978-3-319-31271-2_1(3-14)Online publication date: 4-Nov-2015
- Show More Cited By