Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation

TitleRevisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
Publication TypeConference Proceedings
Year of Conference2013
AuthorsZhu, B., Y. Tan, and G. Gong
Conference NameCryptology and Network Security - CANS'13, Lecture Notes in Computer Science
Volume8257
Pagination20-38
Date PublishedNovember/2013
PublisherM. Abdalla, C. Nita-Rotaru and R. Dahab (Eds.)
Conference LocationBerlin, Germany: Springer-Verlag