Login / Signup

A Modular Approach to the Security Analysis of Two-Permutation Constructions.

Yu Long Chen
Published in: ASIACRYPT (1) (2022)
Keyphrases