Show simple item record

dc.contributor.authorChen, Yu Long
dc.date.accessioned2023-05-26T10:02:59Z
dc.date.available2023-04-29T04:11:24Z
dc.date.available2023-05-26T10:02:59Z
dc.date.issued2022
dc.identifier.isbn978-3-031-22962-6
dc.identifier.issn0302-9743
dc.identifier.otherWOS:000964571400013
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/41491.2
dc.sourceWOS
dc.titleA Modular Approach to the Security Analysis of Two-Permutation Constructions
dc.typeProceedings paper
dc.identifier.doi10.1007/978-3-031-22963-3_13
dc.identifier.eisbn978-3-031-22963-3
dc.source.numberofpages31
dc.source.peerreviewyes
dc.source.beginpage379
dc.source.endpage409
dc.source.conference28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
dc.source.conferencedateDEC 05-09, 2022
dc.source.conferencelocationTaipei
dc.source.journalLecture Notes in Computer Science
dc.source.volume13791
imec.availabilityPublished - imec
dc.description.wosFundingTextThis work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). The author was supported by a Ph.D. Fellowship from the Research Foundation - Flanders (FWO). I want to thank Tim Beyne and the reviewers for their valuable comments and suggestions.


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version