Report copyright - Generic Universal Forgery Attack on Iterative Hash …ec14.compute.dtu.dk/talks/10.pdf · Generic Universal Forgery Attack on Iterative Hash-based MACs Thomas Peyrin and Lei Wang
Please pass captcha verification before submit form
Please pass captcha verification before submit form