Key-recovery attack
Results: 13
# | Item |
---|---|
11![]() | Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security ResearchAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-04-20 21:27:06 |
12![]() | Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie UniversityAdd to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 11:27:16 |
13![]() | Key Recovery Attack on QuiSci by Nils ReimersAdd to Reading ListSource URL: www.php-einfach.deLanguage: English |