Date: 2012-12-11 11:12:53Finite fields Stream ciphers CBC-MAC Block cipher CMAC Classical cipher Keystream Cryptographic hash function Symmetric-key algorithm Cryptography Message authentication codes Block cipher modes of operation | | The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.caAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 352,45 KBShare Document on Facebook
|