Abstract
In this paper, we investigate the security of several recent MAC constructions with provable security beyond the birthday bound (called BBB MACs) in t......
小提示:本篇文献需要登录阅读全文,点击跳转登录