Zhelei Sun, Peng Wang, Liting Zhang. Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. In Ernest Foo, Douglas Stebila, editors, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Volume 9144 of Lecture Notes in Computer Science, pages 3-19, Springer, 2015. [doi]
@inproceedings{SunWZ15-0, title = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes}, author = {Zhelei Sun and Peng Wang and Liting Zhang}, year = {2015}, doi = {10.1007/978-3-319-19962-7_1}, url = {http://dx.doi.org/10.1007/978-3-319-19962-7_1}, researchr = {https://researchr.org/publication/SunWZ15-0}, cites = {0}, citedby = {0}, pages = {3-19}, booktitle = {Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, editor = {Ernest Foo and Douglas Stebila}, volume = {9144}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-19961-0}, }