Cryptology ePrint Archive: Report 2015/811

Available versions in chronological order


Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
Original publication (in the same form): SAC 2015


[ Cryptology ePrint archive ]