Notice

This item has not yet been validated by imec staff.

Notice

This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/39808.2

Show simple item record

dc.contributor.authorBeyne, Tim
dc.contributor.authorChen, Yu Long
dc.contributor.authorDobraunig, Christoph
dc.contributor.authorMennink, Bart
dc.date.accessioned2022-05-12T02:18:55Z
dc.date.available2022-05-12T02:18:55Z
dc.date.issued2022
dc.identifier.isbn978-3-030-99276-7
dc.identifier.issn0302-9743
dc.identifier.otherWOS:000789419300008
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/39808
dc.sourceWOS
dc.titleMulti-user Security of the Elephant v2 Authenticated Encryption Mode
dc.typeProceedings paper
dc.contributor.imecauthorBeyne, Tim
dc.contributor.imecauthorChen, Yu Long
dc.identifier.doi10.1007/978-3-030-99277-4_8
dc.identifier.eisbn978-3-030-99277-4
dc.source.numberofpages24
dc.source.peerreviewyes
dc.source.beginpage155
dc.source.endpage178
dc.source.conference28th International Conference on Selected Areas in Cryptography (SAC)
dc.source.conferencedateSEP 29-OCT 01, 2021
dc.source.volume13203
imec.availabilityUnder review


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version