Publication:
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
| dc.contributor.author | Beyne, Tim | |
| dc.contributor.author | Chen, Yu Long | |
| dc.contributor.author | Dobraunig, Christoph | |
| dc.contributor.author | Mennink, Bart | |
| dc.contributor.imecauthor | Beyne, Tim | |
| dc.contributor.imecauthor | Chen, Yu Long | |
| dc.date.accessioned | 2022-05-25T08:09:05Z | |
| dc.date.available | 2022-05-12T02:18:55Z | |
| dc.date.available | 2022-05-25T08:09:05Z | |
| dc.date.issued | 2022 | |
| dc.identifier.doi | 10.1007/978-3-030-99277-4_8 | |
| dc.identifier.eisbn | 978-3-030-99277-4 | |
| dc.identifier.isbn | 978-3-030-99276-7 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/39808 | |
| dc.publisher | SPRINGER INTERNATIONAL PUBLISHING AG | |
| dc.source.beginpage | 155 | |
| dc.source.conference | 28th International Conference on Selected Areas in Cryptography (SAC) | |
| dc.source.conferencedate | SEP 29-OCT 01, 2021 | |
| dc.source.conferencelocation | Virtual | |
| dc.source.endpage | 178 | |
| dc.source.journal | Lecture Notes in Computer Science | |
| dc.source.numberofpages | 24 | |
| dc.source.volume | 13203 | |
| dc.subject.keywords | BOUNDS | |
| dc.title | Multi-user Security of the Elephant v2 Authenticated Encryption Mode | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |