dc.contributor.author | Wang, Jinliang | |
dc.contributor.author | Niu, Chao | |
dc.contributor.author | Liu, Qun | |
dc.contributor.author | Li, Muzhou | |
dc.contributor.author | Preneel, Bart | |
dc.contributor.author | Wang, Meiqin | |
dc.date.accessioned | 2024-11-04T11:21:19Z | |
dc.date.available | 2024-10-23T17:04:24Z | |
dc.date.available | 2024-11-04T11:21:19Z | |
dc.date.issued | 2023 | |
dc.identifier.isbn | 978-3-031-35485-4 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | WOS:001310807200007 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/44675.2 | |
dc.source | WOS | |
dc.title | Cryptanalysis of SPEEDY | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Preneel, Bart | |
dc.identifier.doi | 10.1007/978-3-031-35486-1_7 | |
dc.identifier.eisbn | 978-3-031-35486-1 | |
dc.source.numberofpages | 33 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 124 | |
dc.source.endpage | 156 | |
dc.source.conference | 28th Australasian Conference on Information Security and Privacy (ACISP) | |
dc.source.conferencedate | JUL 05-07, 2023 | |
dc.source.conferencelocation | Brisbane | |
dc.source.journal | Lecture Notes in Computer Science | |
dc.source.volume | 13915 | |
imec.availability | Published - imec | |
dc.description.wosFundingText | The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. This work is supported by the National Key Research and Development Program of China (Grant No. 2018YFA0704702), the National Natural Science Foundation of China (Grant No. 62032014), the Major Basic Research Project of Natural Science Foundation of Shandong Province, China (Grant No. ZR202010220025). The corresponding author is also supported by Qingdao Innovation project (Grant No. QDBSH20230101008). | |