Publication:

A Modular Approach to the Security Analysis of Two-Permutation Constructions

 
dc.contributor.authorChen, Yu Long
dc.date.accessioned2023-05-26T10:02:59Z
dc.date.available2023-04-29T04:11:24Z
dc.date.available2023-05-26T10:02:59Z
dc.date.issued2022
dc.description.wosFundingTextThis work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). The author was supported by a Ph.D. Fellowship from the Research Foundation - Flanders (FWO). I want to thank Tim Beyne and the reviewers for their valuable comments and suggestions.
dc.identifier.doi10.1007/978-3-031-22963-3_13
dc.identifier.eisbn978-3-031-22963-3
dc.identifier.isbn978-3-031-22962-6
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/41491
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage379
dc.source.conference28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
dc.source.conferencedateDEC 05-09, 2022
dc.source.conferencelocationTaipei
dc.source.endpage409
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages31
dc.source.volume13791
dc.title

A Modular Approach to the Security Analysis of Two-Permutation Constructions

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: