Conference paper
Efficient routing and scheduling algorithms for optical networks
Alok Aggarwal, Amotz Bar-Noy, et al.
SODA 1994
Two attacks on message authentication code (MAC) algorithm 4 from ISO/IEC FDIS 9797-1 is described, which apply when it is used with padding method 1 or 2, and where no MAC truncation is employed. In this case the attacks are significantly more efficient than the best previously known attack.
Alok Aggarwal, Amotz Bar-Noy, et al.
SODA 1994
D. Coppersmith, J.H. Davenport
Journal of Symbolic Computation
D. Coppersmith, J.S. Coron, et al.
Journal of Cryptology
G. Bongiovanni, D. Coppersmith, et al.
IEEE Transactions on Communications