Publication:

Cryptanalysis of SPEEDY

 
dc.contributor.authorWang, Jinliang
dc.contributor.authorNiu, Chao
dc.contributor.authorLiu, Qun
dc.contributor.authorLi, Muzhou
dc.contributor.authorPreneel, Bart
dc.contributor.authorWang, Meiqin
dc.contributor.imecauthorPreneel, Bart
dc.date.accessioned2024-11-04T11:21:19Z
dc.date.available2024-10-23T17:04:24Z
dc.date.available2024-11-04T11:21:19Z
dc.date.issued2023
dc.description.wosFundingTextThe authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. This work is supported by the National Key Research and Development Program of China (Grant No. 2018YFA0704702), the National Natural Science Foundation of China (Grant No. 62032014), the Major Basic Research Project of Natural Science Foundation of Shandong Province, China (Grant No. ZR202010220025). The corresponding author is also supported by Qingdao Innovation project (Grant No. QDBSH20230101008).
dc.identifier.doi10.1007/978-3-031-35486-1_7
dc.identifier.eisbn978-3-031-35486-1
dc.identifier.isbn978-3-031-35485-4
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44675
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage124
dc.source.conference28th Australasian Conference on Information Security and Privacy (ACISP)
dc.source.conferencedateJUL 05-07, 2023
dc.source.conferencelocationBrisbane
dc.source.endpage156
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages33
dc.source.volume13915
dc.title

Cryptanalysis of SPEEDY

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: