Volume 28; Issue 4

Journal of Cryptology

Volume 28; Issue 4
1

Almost-Everywhere Secure Computation with Edge Corruptions

Year:
2015
Language:
english
File:
PDF, 369 KB
english, 2015
3

New Proofs for NMAC and HMAC: Security without Collision Resistance

Year:
2015
Language:
english
File:
PDF, 1.22 MB
english, 2015
4

Collision Attack onGrindahl

Year:
2015
Language:
english
File:
PDF, 550 KB
english, 2015
5

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

Year:
2015
Language:
english
File:
PDF, 348 KB
english, 2015