Analysis of existing Beyond Birthday Bound MAC schemes

• Cryptanalysis techniques on Beyond Birthday-Bound Secure claimed MAC schemes such as EWCDM, etc..

• Theoretically and practically analyzed the Encrypted Wegmen-Carter MAC scheme and H-coefficients technique.

Next
Previous