dc.contributor.author | Chen, Yu Long | |
dc.date.accessioned | 2023-05-26T10:02:59Z | |
dc.date.available | 2023-04-29T04:11:24Z | |
dc.date.available | 2023-05-26T10:02:59Z | |
dc.date.issued | 2022 | |
dc.identifier.isbn | 978-3-031-22962-6 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | WOS:000964571400013 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/41491.2 | |
dc.source | WOS | |
dc.title | A Modular Approach to the Security Analysis of Two-Permutation Constructions | |
dc.type | Proceedings paper | |
dc.identifier.doi | 10.1007/978-3-031-22963-3_13 | |
dc.identifier.eisbn | 978-3-031-22963-3 | |
dc.source.numberofpages | 31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 379 | |
dc.source.endpage | 409 | |
dc.source.conference | 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) | |
dc.source.conferencedate | DEC 05-09, 2022 | |
dc.source.conferencelocation | Taipei | |
dc.source.journal | Lecture Notes in Computer Science | |
dc.source.volume | 13791 | |
imec.availability | Published - imec | |
dc.description.wosFundingText | This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). The author was supported by a Ph.D. Fellowship from the Research Foundation - Flanders (FWO). I want to thank Tim Beyne and the reviewers for their valuable comments and suggestions. | |