Improved Generic Attacks against Hash-Based MACs and HAIFA, Lecture Notes in Computer Science, vol.1, issue.8616, pp.149-168, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01407953
Collision Attacks Against CAESAR Candidates, Advances in Cryptology -ASIACRYPT 2015. Lecture Notes in Computer Science, 2015. ,
DOI : 10.1007/978-3-662-48800-3_21
URL : https://hal.archives-ouvertes.fr/hal-01102031
Updates on Generic Attacks against HMAC and NMAC, Lecture Notes in Computer Science, vol.1, issue.8616, pp.131-148, 2014. ,
DOI : 10.1007/978-3-662-44371-2_8
Distinguishing and Second-Preimage Attacks on CBC-Like MACs, Lecture Notes in Computer Science, vol.5888, pp.349-361, 2009. ,
DOI : 10.1007/978-3-642-10433-6_23
Forgery and Key Recovery Attacks on PMAC and Mitchell???s TMAC Variant ,
DOI : 10.1007/11780656_35
New Generic Attacks against Hash-Based MACs, Lecture Notes in Computer Science, vol.8270, issue.2, pp.1-20, 2013. ,
DOI : 10.1007/978-3-642-42045-0_1
Generic Universal Forgery Attack on Iterative Hash-Based MACs, Lecture Notes in Computer Science, vol.8441, pp.147-164, 2014. ,
DOI : 10.1007/978-3-642-55220-5_9
MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol.963, pp.1-14, 1995. ,
DOI : 10.1007/3-540-44750-4_1
On the Security of Two MAC Algorithms, Lecture Notes in Computer Science, vol.1070, pp.19-32, 1996. ,
DOI : 10.1007/3-540-68339-9_3