On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes
Crossref DOI link: https://doi.org/10.1007/s00145-014-9178-9
Published Online: 2014-09-12
Published Print: 2015-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Procter, Gordon
Cid, Carlos
Text and Data Mining valid from 2014-09-12
Article History
Received: 25 April 2013
First Online: 12 September 2014
Free to read: This content has been made available to all.