@dblp

Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.

, , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 169-189. Springer, (2023)

Links and resources

Tags