Download pdf
Download pdf
Techniques on message authentication code (MAC) and authenticated encryption (AE) will be discussed. Topic 1: Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions Authors: Tetsu Iwata; Virginie Lallemand; Gregor Leander; Yu Sasaki Topic 2: Linking Stam’s Bounds with Generalized Truncation Authors: Bart Mennink