Cryptology ePrint Archive: Report 2015/811
Available versions in chronological order
20150814:154753 (posted 14-Aug-2015 15:47:53 UTC)
Key-recovery attacks against the MAC algorithm Chaskey
Chrysanthi Mavromati
Original publication (in the same form): SAC 2015
[
Cryptology ePrint archive
]