Notice

This item has not yet been validated by imec staff.

Notice

This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/41491.2

Show simple item record

dc.contributor.authorChen, Yu Long
dc.date.accessioned2023-04-29T04:11:24Z
dc.date.available2023-04-29T04:11:24Z
dc.date.issued2022
dc.identifier.isbn978-3-031-22962-6
dc.identifier.issn0302-9743
dc.identifier.otherWOS:000964571400013
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/41491
dc.sourceWOS
dc.titleA Modular Approach to the Security Analysis of Two-Permutation Constructions
dc.typeProceedings paper
dc.identifier.doi10.1007/978-3-031-22963-3_13
dc.identifier.eisbn978-3-031-22963-3
dc.source.numberofpages31
dc.source.peerreviewyes
dc.source.beginpage379
dc.source.endpage409
dc.source.conference28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT)
dc.source.conferencedateDEC 05-09, 2022
dc.source.conferencelocationTaipei
dc.source.volume13791
imec.availabilityUnder review


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version