Key Recovery Attacks on the RMAC, TMAC, and IACBC

Jaechul Sung, Deukjo Hong, Sangjin Lee. Key Recovery Attacks on the RMAC, TMAC, and IACBC. In Reihaneh Safavi-Naini, Jennifer Seberry, editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Volume 2727 of Lecture Notes in Computer Science, pages 265-273, Springer, 2003. [doi]

Abstract

Abstract is missing.