The security of multiple encryption in the ideal cipher model

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 218
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorDai, Yuanxiko
dc.contributor.authorLee, Jooyoungko
dc.contributor.authorMennink, Bartko
dc.contributor.authorSteinberger, Johnko
dc.date.accessioned2017-08-02T08:46:33Z-
dc.date.available2017-08-02T08:46:33Z-
dc.date.created2017-07-20-
dc.date.created2017-07-20-
dc.date.created2017-07-20-
dc.date.created2017-07-20-
dc.date.issued2014-08-17-
dc.identifier.citation34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38-
dc.identifier.urihttp://hdl.handle.net/10203/224962-
dc.languageEnglish-
dc.publisherInternational Association for Cryptologic Research (IACR)-
dc.titleThe security of multiple encryption in the ideal cipher model-
dc.typeConference-
dc.type.rimsCONF-
dc.citation.beginningpage20-
dc.citation.endingpage38-
dc.citation.publicationname34rd Annual International Cryptology Conference, CRYPTO 2014-
dc.identifier.conferencecountryUS-
dc.identifier.conferencelocationUCSB, Santa Barbara, CA-
dc.identifier.doi10.1007/978-3-662-44371-2_2-
dc.contributor.localauthorLee, Jooyoung-
dc.contributor.nonIdAuthorDai, Yuanxi-
dc.contributor.nonIdAuthorMennink, Bart-
dc.contributor.nonIdAuthorSteinberger, John-
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0