Amanote Research

Amanote Research

    RegisterSign In

A MAC Forgery Attack on SOBER-128

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-540-25937-4_30
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2004

Authors
Dai WatanabeSoichi Furuya
Publisher

Springer Berlin Heidelberg


Related search

A Structured Multi-Signature Scheme Against Forgery Attack

International Journal of Wireless and Microwave Technologies
2011English

New Forgery Attack on Chang Et Al.'s Signature Scheme

2013English

New Distinguishing Attack on MAC Using Secret-Prefix Method

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Leaked-State-Forgery Attack Against the Authenticated Encryption Algorithm ALE

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

A Survey on Photo Forgery Detection Methods

ITM Web of Conferences
2018English

Objective Evidence and Absence: Comment on Sober

Philosophical Studies
Philosophy
2008English

A Sober Assessment of Drug Courts1

Federal Sentencing Reporter
2003English

Image Forgery and Detection of Copy Move Forgery in Digital Images: A Survey of Recent Forgery Detection Techniques

International Journal of Computer Applications
2016English

Forgery Above a Genuine Signature

The Journal of Criminal Law, Criminology, and Police Science
1960English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy