Applications of H-Technique: Revisiting Symmetric Key Security Analysis. Jha, A. & Nandi, M. IACR Cryptology ePrint Archive, 2018:1130, 2018. Paper bibtex @article{DBLP:journals/iacr/JhaN18,
author = {Ashwin Jha and
Mridul Nandi},
title = {Applications of H-Technique: Revisiting Symmetric Key Security Analysis},
journal = {{IACR} Cryptology ePrint Archive},
volume = {2018},
pages = {1130},
year = {2018},
url = {https://eprint.iacr.org/2018/1130},
timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/JhaN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"8ZX7iNHGzsFWgZxYA","bibbaseid":"jha-nandi-applicationsofhtechniquerevisitingsymmetrickeysecurityanalysis-2018","authorIDs":["dWkHd8XYhwAjy9Lzs"],"author_short":["Jha, A.","Nandi, M."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ashwin"],"propositions":[],"lastnames":["Jha"],"suffixes":[]},{"firstnames":["Mridul"],"propositions":[],"lastnames":["Nandi"],"suffixes":[]}],"title":"Applications of H-Technique: Revisiting Symmetric Key Security Analysis","journal":"IACR Cryptology ePrint Archive","volume":"2018","pages":"1130","year":"2018","url":"https://eprint.iacr.org/2018/1130","timestamp":"Tue, 11 Dec 2018 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/iacr/JhaN18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/JhaN18,\n author = {Ashwin Jha and\n Mridul Nandi},\n title = {Applications of H-Technique: Revisiting Symmetric Key Security Analysis},\n journal = {{IACR} Cryptology ePrint Archive},\n volume = {2018},\n pages = {1130},\n year = {2018},\n url = {https://eprint.iacr.org/2018/1130},\n timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/iacr/JhaN18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jha, A.","Nandi, M."],"key":"DBLP:journals/iacr/JhaN18","id":"DBLP:journals/iacr/JhaN18","bibbaseid":"jha-nandi-applicationsofhtechniquerevisitingsymmetrickeysecurityanalysis-2018","role":"author","urls":{"Paper":"https://eprint.iacr.org/2018/1130"},"downloads":0,"html":""},"bibtype":"article","biburl":"https://dblp.org/pid/06/2136.bib","creationDate":"2020-03-26T08:29:49.652Z","downloads":0,"keywords":[],"search_terms":["applications","technique","revisiting","symmetric","key","security","analysis","jha","nandi"],"title":"Applications of H-Technique: Revisiting Symmetric Key Security Analysis","year":2018,"dataSources":["MuqitKytbZXJmeMjA"]}