Posted on
in Presentations
Techniques on message authentication code (MAC) and authenticated encryption (AE) will be discussed.
Topic 1: Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
Authors: Tetsu Iwata; Virginie Lallemand; Gregor Leander; Yu Sasaki
Topic 2: Linking Stam’s Bounds with Generalized Truncation
Authors: Bart Mennink
Share With Your Community