Notice
This item has not yet been validated by imec staff.
Notice
This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/41491.2
A Modular Approach to the Security Analysis of Two-Permutation Constructions
dc.contributor.author | Chen, Yu Long | |
dc.date.accessioned | 2023-04-29T04:11:24Z | |
dc.date.available | 2023-04-29T04:11:24Z | |
dc.date.issued | 2022 | |
dc.identifier.isbn | 978-3-031-22962-6 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | WOS:000964571400013 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/41491 | |
dc.source | WOS | |
dc.title | A Modular Approach to the Security Analysis of Two-Permutation Constructions | |
dc.type | Proceedings paper | |
dc.identifier.doi | 10.1007/978-3-031-22963-3_13 | |
dc.identifier.eisbn | 978-3-031-22963-3 | |
dc.source.numberofpages | 31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 379 | |
dc.source.endpage | 409 | |
dc.source.conference | 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) | |
dc.source.conferencedate | DEC 05-09, 2022 | |
dc.source.conferencelocation | Taipei | |
dc.source.volume | 13791 | |
imec.availability | Under review |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |