Cryptology ePrint Archive: Report 2013/144
Available versions in chronological order
20130313:050851 (posted 13-Mar-2013 05:08:51 UTC)
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013
20130426:142435 (posted 26-Apr-2013 14:24:35 UTC)
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013
20140115:152424 (posted 15-Jan-2014 15:24:24 UTC)
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Gordon Procter and Carlos Cid
Publication Info: A short version of this paper was presented at Fast Software Encryption 2013
[
Cryptology ePrint archive
]