陈嘉耕

华中师范大学


Curriculum vitae


[email protected]


QQ: 939288955


计算机学院

伍伦贡联合研究院

湖北省武汉市洪山区珞喻路152号华中师范大学


Related-Key Boomerang Attacks on KATAN32/48/64


Conference paper


Takanori Isobe, Yu Sasaki, Jiageng Chen
Lecture Notes in Computer Science, Colin Boyd, Leonie Simpson, Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, vol. 7959, Springer, 2013, pp. 268--285

Cite

Cite

APA   Click to copy
Isobe, T., Sasaki, Y., & Chen, J. (2013). Related-Key Boomerang Attacks on KATAN32/48/64. In C. Boyd & L. Simpson (Eds.), Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings (Vol. 7959, pp. 268–285). Springer.


Chicago/Turabian   Click to copy
Isobe, Takanori, Yu Sasaki, and Jiageng Chen. “Related-Key Boomerang Attacks on KATAN32/48/64.” In Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, edited by Colin Boyd and Leonie Simpson, 7959:268–285. Lecture Notes in Computer Science. Springer, 2013.


MLA   Click to copy
Isobe, Takanori, et al. “Related-Key Boomerang Attacks on KATAN32/48/64.” Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, edited by Colin Boyd and Leonie Simpson, vol. 7959, Springer, 2013, pp. 268–85.


BibTeX   Click to copy

@inproceedings{isobe2013a,
  title = {Related-Key Boomerang Attacks on KATAN32/48/64},
  year = {2013},
  pages = {268--285},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7959},
  author = {Isobe, Takanori and Sasaki, Yu and Chen, Jiageng},
  editor = {Boyd, Colin and Simpson, Leonie},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}
}


Share

Tools
Translate to