Key-Recovery Attacks Against the MAC Algorithm Chaskey
From MaRDI portal
Publication:2807207
DOI10.1007/978-3-319-31301-6_12zbMath1396.94091OpenAlexW2401637401MaRDI QIDQ2807207
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_12
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- CBC MACs for arbitrary-length messages: The three-key constructions
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
- SipHash: A Fast Short-Input PRF
- Another Look at Provable Security
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited
- Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
This page was built for publication: Key-Recovery Attacks Against the MAC Algorithm Chaskey