Publication:

Multi-user Security of the Elephant v2 Authenticated Encryption Mode

 
dc.contributor.authorBeyne, Tim
dc.contributor.authorChen, Yu Long
dc.contributor.authorDobraunig, Christoph
dc.contributor.authorMennink, Bart
dc.contributor.imecauthorBeyne, Tim
dc.contributor.imecauthorChen, Yu Long
dc.date.accessioned2022-05-25T08:09:05Z
dc.date.available2022-05-12T02:18:55Z
dc.date.available2022-05-25T08:09:05Z
dc.date.issued2022
dc.identifier.doi10.1007/978-3-030-99277-4_8
dc.identifier.eisbn978-3-030-99277-4
dc.identifier.isbn978-3-030-99276-7
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/39808
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage155
dc.source.conference28th International Conference on Selected Areas in Cryptography (SAC)
dc.source.conferencedateSEP 29-OCT 01, 2021
dc.source.conferencelocationVirtual
dc.source.endpage178
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages24
dc.source.volume13203
dc.subject.keywordsBOUNDS
dc.title

Multi-user Security of the Elephant v2 Authenticated Encryption Mode

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: