DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dai, Yuanxi | ko |
dc.contributor.author | Lee, Jooyoung | ko |
dc.contributor.author | Mennink, Bart | ko |
dc.contributor.author | Steinberger, John | ko |
dc.date.accessioned | 2017-08-02T08:46:33Z | - |
dc.date.available | 2017-08-02T08:46:33Z | - |
dc.date.created | 2017-07-20 | - |
dc.date.created | 2017-07-20 | - |
dc.date.created | 2017-07-20 | - |
dc.date.created | 2017-07-20 | - |
dc.date.issued | 2014-08-17 | - |
dc.identifier.citation | 34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38 | - |
dc.identifier.uri | http://hdl.handle.net/10203/224962 | - |
dc.language | English | - |
dc.publisher | International Association for Cryptologic Research (IACR) | - |
dc.title | The security of multiple encryption in the ideal cipher model | - |
dc.type | Conference | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 20 | - |
dc.citation.endingpage | 38 | - |
dc.citation.publicationname | 34rd Annual International Cryptology Conference, CRYPTO 2014 | - |
dc.identifier.conferencecountry | US | - |
dc.identifier.conferencelocation | UCSB, Santa Barbara, CA | - |
dc.identifier.doi | 10.1007/978-3-662-44371-2_2 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
dc.contributor.nonIdAuthor | Dai, Yuanxi | - |
dc.contributor.nonIdAuthor | Mennink, Bart | - |
dc.contributor.nonIdAuthor | Steinberger, John | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.