D. Coppersmith, G.Y. Nagy, et al.
Studia Scientiarum Mathematicarum Hungarica
Two attacks on message authentication code (MAC) algorithm 4 from ISO/IEC FDIS 9797-1 is described, which apply when it is used with padding method 1 or 2, and where no MAC truncation is employed. In this case the attacks are significantly more efficient than the best previously known attack.
D. Coppersmith, G.Y. Nagy, et al.
Studia Scientiarum Mathematicarum Hungarica
N. Alon, E.E. Bergmann, et al.
IEEE Trans. Inf. Theory
Alok Aggarwal, D. Coppersmith, et al.
SODA 1997
Alok Aggarwal, Amotz Bar-Noy, et al.
Journal of the ACM