Publication:
A Modular Approach to the Security Analysis of Two-Permutation Constructions
| dc.contributor.author | Chen, Yu Long | |
| dc.date.accessioned | 2023-05-26T10:02:59Z | |
| dc.date.available | 2023-04-29T04:11:24Z | |
| dc.date.available | 2023-05-26T10:02:59Z | |
| dc.date.issued | 2022 | |
| dc.description.wosFundingText | This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). The author was supported by a Ph.D. Fellowship from the Research Foundation - Flanders (FWO). I want to thank Tim Beyne and the reviewers for their valuable comments and suggestions. | |
| dc.identifier.doi | 10.1007/978-3-031-22963-3_13 | |
| dc.identifier.eisbn | 978-3-031-22963-3 | |
| dc.identifier.isbn | 978-3-031-22962-6 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/41491 | |
| dc.publisher | SPRINGER INTERNATIONAL PUBLISHING AG | |
| dc.source.beginpage | 379 | |
| dc.source.conference | 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) | |
| dc.source.conferencedate | DEC 05-09, 2022 | |
| dc.source.conferencelocation | Taipei | |
| dc.source.endpage | 409 | |
| dc.source.journal | Lecture Notes in Computer Science | |
| dc.source.numberofpages | 31 | |
| dc.source.volume | 13791 | |
| dc.title | A Modular Approach to the Security Analysis of Two-Permutation Constructions | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |