Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2020-08-10

AUTHORS

Tim Beyne , Anne Canteaut , Itai Dinur , Maria Eichlseder , Gregor Leander , Gaëtan Leurent , María Naya-Plasencia , Léo Perrin , Yu Sasaki , Yosuke Todo , Friedrich Wiemer

ABSTRACT

The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic. More... »

PAGES

299-328

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11

DOI

http://dx.doi.org/10.1007/978-3-030-56877-1_11

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1130046450


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "imec-COSIC, KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC, KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Beyne", 
        "givenName": "Tim", 
        "id": "sg:person.016307275151.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016307275151.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "id": "sg:person.012730266023.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, Ben-Gurion University, Beersheba, Israel", 
          "id": "http://www.grid.ac/institutes/grid.7489.2", 
          "name": [
            "Department of Computer Science, Ben-Gurion University, Beersheba, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dinur", 
        "givenName": "Itai", 
        "id": "sg:person.012046016703.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012046016703.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Graz University of Technology, Graz, Austria", 
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Eichlseder", 
        "givenName": "Maria", 
        "id": "sg:person.014606337775.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014606337775.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leander", 
        "givenName": "Gregor", 
        "id": "sg:person.016572560277.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016572560277.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leurent", 
        "givenName": "Ga\u00ebtan", 
        "id": "sg:person.016371722741.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016371722741.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Perrin", 
        "givenName": "L\u00e9o", 
        "id": "sg:person.011075613613.62", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011075613613.62"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/grid.419819.c", 
          "name": [
            "NTT Secure Platform Laboratories, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sasaki", 
        "givenName": "Yu", 
        "id": "sg:person.014072424160.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/grid.419819.c", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
            "NTT Secure Platform Laboratories, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Todo", 
        "givenName": "Yosuke", 
        "id": "sg:person.013247762751.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013247762751.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "cryptosolutions, Essen, Germany", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
            "cryptosolutions, Essen, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wiemer", 
        "givenName": "Friedrich", 
        "id": "sg:person.07404240044.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07404240044.70"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2020-08-10", 
    "datePublishedReg": "2020-08-10", 
    "description": "The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic.", 
    "editor": [
      {
        "familyName": "Micciancio", 
        "givenName": "Daniele", 
        "type": "Person"
      }, 
      {
        "familyName": "Ristenpart", 
        "givenName": "Thomas", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-56877-1_11", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-030-56876-4", 
        "978-3-030-56877-1"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2020", 
      "type": "Book"
    }, 
    "keywords": [
      "hash function", 
      "proof system", 
      "cryptographic techniques", 
      "security level", 
      "security evaluation", 
      "such primitives", 
      "symmetric primitives", 
      "sponge construction", 
      "primitives", 
      "practical collision attacks", 
      "implementation constraints", 
      "cryptanalytic techniques", 
      "collision attack", 
      "preimage attack", 
      "concrete setting", 
      "design approach", 
      "attacks", 
      "public challenge", 
      "new proposal", 
      "SNARKs", 
      "recent family", 
      "practical use", 
      "security", 
      "Bulletproofs", 
      "standard design approach", 
      "system", 
      "technique", 
      "constraints", 
      "distinguisher", 
      "instances", 
      "proposal", 
      "protocol", 
      "permutations", 
      "performance", 
      "challenges", 
      "version", 
      "odd characteristic", 
      "work", 
      "construction", 
      "evaluation", 
      "use", 
      "field", 
      "function", 
      "results", 
      "setting", 
      "parameters", 
      "reasons", 
      "characteristics", 
      "most parameters", 
      "levels", 
      "family", 
      "approach"
    ], 
    "name": "Out of Oddity \u2013 New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems", 
    "pagination": "299-328", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1130046450"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-56877-1_11"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-56877-1_11", 
      "https://app.dimensions.ai/details/publication/pub.1130046450"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T07:00", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_58.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-56877-1_11"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'


 

This table displays all metadata directly associated to this object as RDF triples.

204 TRIPLES      22 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-56877-1_11 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Nefb59417971744a7b1f7fa6b4b727ca3
4 schema:datePublished 2020-08-10
5 schema:datePublishedReg 2020-08-10
6 schema:description The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic.
7 schema:editor N170051ecb73f40de8d9e53c2f1eaa0f9
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N65fbcedac3de454aa2879b09321f1c10
11 schema:keywords Bulletproofs
12 SNARKs
13 approach
14 attacks
15 challenges
16 characteristics
17 collision attack
18 concrete setting
19 constraints
20 construction
21 cryptanalytic techniques
22 cryptographic techniques
23 design approach
24 distinguisher
25 evaluation
26 family
27 field
28 function
29 hash function
30 implementation constraints
31 instances
32 levels
33 most parameters
34 new proposal
35 odd characteristic
36 parameters
37 performance
38 permutations
39 practical collision attacks
40 practical use
41 preimage attack
42 primitives
43 proof system
44 proposal
45 protocol
46 public challenge
47 reasons
48 recent family
49 results
50 security
51 security evaluation
52 security level
53 setting
54 sponge construction
55 standard design approach
56 such primitives
57 symmetric primitives
58 system
59 technique
60 use
61 version
62 work
63 schema:name Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems
64 schema:pagination 299-328
65 schema:productId N490dcbfc49834bb6a307d4263979a7bc
66 N7936234c4628431497574c275f6564b2
67 schema:publisher Nf80ec96efec84aaeb95bd61dc169abd9
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1130046450
69 https://doi.org/10.1007/978-3-030-56877-1_11
70 schema:sdDatePublished 2022-10-01T07:00
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher Nfc8fdb2e31e94fe6b4e1fc88c9c99b6d
73 schema:url https://doi.org/10.1007/978-3-030-56877-1_11
74 sgo:license sg:explorer/license/
75 sgo:sdDataset chapters
76 rdf:type schema:Chapter
77 N007f9b84fc9d493b85c72bfc61736dd8 rdf:first sg:person.07404240044.70
78 rdf:rest rdf:nil
79 N05a0a49e900a42a8a0a54d506f0cd1af rdf:first sg:person.012730266023.08
80 rdf:rest N20d30b001f994f078bf10a1e6bbd06aa
81 N09116cbc434c4aad8e96656230177f16 rdf:first sg:person.013206304341.94
82 rdf:rest N3390a13fa8df4c10a15ffa22e89f3075
83 N170051ecb73f40de8d9e53c2f1eaa0f9 rdf:first Ndcb3ec214dc94babb6a2fca6b514637c
84 rdf:rest N553aa631be62438caf75de294a8313a8
85 N20d30b001f994f078bf10a1e6bbd06aa rdf:first sg:person.012046016703.69
86 rdf:rest N4e315e187bef49d6ad54c6ddb9114de9
87 N30b4928dd6de46e09b7fdb7bdad25742 rdf:first sg:person.016371722741.32
88 rdf:rest N09116cbc434c4aad8e96656230177f16
89 N3390a13fa8df4c10a15ffa22e89f3075 rdf:first sg:person.011075613613.62
90 rdf:rest N7a86b87ba2fe4d6abc5a798dfe441184
91 N490dcbfc49834bb6a307d4263979a7bc schema:name doi
92 schema:value 10.1007/978-3-030-56877-1_11
93 rdf:type schema:PropertyValue
94 N4e315e187bef49d6ad54c6ddb9114de9 rdf:first sg:person.014606337775.51
95 rdf:rest N910a70f43f1b41989d96b0b397069854
96 N4e678a4ede47402184596f6e8bc65112 schema:familyName Ristenpart
97 schema:givenName Thomas
98 rdf:type schema:Person
99 N553aa631be62438caf75de294a8313a8 rdf:first N4e678a4ede47402184596f6e8bc65112
100 rdf:rest rdf:nil
101 N65fbcedac3de454aa2879b09321f1c10 schema:isbn 978-3-030-56876-4
102 978-3-030-56877-1
103 schema:name Advances in Cryptology – CRYPTO 2020
104 rdf:type schema:Book
105 N7936234c4628431497574c275f6564b2 schema:name dimensions_id
106 schema:value pub.1130046450
107 rdf:type schema:PropertyValue
108 N7a86b87ba2fe4d6abc5a798dfe441184 rdf:first sg:person.014072424160.79
109 rdf:rest Ncbed0e28de1c4a35aa2698e8b520b2e7
110 N910a70f43f1b41989d96b0b397069854 rdf:first sg:person.016572560277.70
111 rdf:rest N30b4928dd6de46e09b7fdb7bdad25742
112 Ncbed0e28de1c4a35aa2698e8b520b2e7 rdf:first sg:person.013247762751.78
113 rdf:rest N007f9b84fc9d493b85c72bfc61736dd8
114 Ndcb3ec214dc94babb6a2fca6b514637c schema:familyName Micciancio
115 schema:givenName Daniele
116 rdf:type schema:Person
117 Nefb59417971744a7b1f7fa6b4b727ca3 rdf:first sg:person.016307275151.53
118 rdf:rest N05a0a49e900a42a8a0a54d506f0cd1af
119 Nf80ec96efec84aaeb95bd61dc169abd9 schema:name Springer Nature
120 rdf:type schema:Organisation
121 Nfc8fdb2e31e94fe6b4e1fc88c9c99b6d schema:name Springer Nature - SN SciGraph project
122 rdf:type schema:Organization
123 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
124 schema:name Information and Computing Sciences
125 rdf:type schema:DefinedTerm
126 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
127 schema:name Computation Theory and Mathematics
128 rdf:type schema:DefinedTerm
129 sg:person.011075613613.62 schema:affiliation grid-institutes:grid.5328.c
130 schema:familyName Perrin
131 schema:givenName Léo
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011075613613.62
133 rdf:type schema:Person
134 sg:person.012046016703.69 schema:affiliation grid-institutes:grid.7489.2
135 schema:familyName Dinur
136 schema:givenName Itai
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012046016703.69
138 rdf:type schema:Person
139 sg:person.012730266023.08 schema:affiliation grid-institutes:grid.5328.c
140 schema:familyName Canteaut
141 schema:givenName Anne
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08
143 rdf:type schema:Person
144 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
145 schema:familyName Naya-Plasencia
146 schema:givenName María
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
148 rdf:type schema:Person
149 sg:person.013247762751.78 schema:affiliation grid-institutes:grid.419819.c
150 schema:familyName Todo
151 schema:givenName Yosuke
152 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013247762751.78
153 rdf:type schema:Person
154 sg:person.014072424160.79 schema:affiliation grid-institutes:grid.419819.c
155 schema:familyName Sasaki
156 schema:givenName Yu
157 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79
158 rdf:type schema:Person
159 sg:person.014606337775.51 schema:affiliation grid-institutes:grid.5570.7
160 schema:familyName Eichlseder
161 schema:givenName Maria
162 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014606337775.51
163 rdf:type schema:Person
164 sg:person.016307275151.53 schema:affiliation grid-institutes:grid.5596.f
165 schema:familyName Beyne
166 schema:givenName Tim
167 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016307275151.53
168 rdf:type schema:Person
169 sg:person.016371722741.32 schema:affiliation grid-institutes:grid.5328.c
170 schema:familyName Leurent
171 schema:givenName Gaëtan
172 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016371722741.32
173 rdf:type schema:Person
174 sg:person.016572560277.70 schema:affiliation grid-institutes:grid.5570.7
175 schema:familyName Leander
176 schema:givenName Gregor
177 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016572560277.70
178 rdf:type schema:Person
179 sg:person.07404240044.70 schema:affiliation grid-institutes:None
180 schema:familyName Wiemer
181 schema:givenName Friedrich
182 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07404240044.70
183 rdf:type schema:Person
184 grid-institutes:None schema:alternateName cryptosolutions, Essen, Germany
185 schema:name Ruhr-Universität Bochum, Bochum, Germany
186 cryptosolutions, Essen, Germany
187 rdf:type schema:Organization
188 grid-institutes:grid.419819.c schema:alternateName NTT Secure Platform Laboratories, Tokyo, Japan
189 schema:name NTT Secure Platform Laboratories, Tokyo, Japan
190 Ruhr-Universität Bochum, Bochum, Germany
191 rdf:type schema:Organization
192 grid-institutes:grid.5328.c schema:alternateName Inria, Paris, France
193 schema:name Inria, Paris, France
194 rdf:type schema:Organization
195 grid-institutes:grid.5570.7 schema:alternateName Ruhr-Universität Bochum, Bochum, Germany
196 schema:name Graz University of Technology, Graz, Austria
197 Ruhr-Universität Bochum, Bochum, Germany
198 rdf:type schema:Organization
199 grid-institutes:grid.5596.f schema:alternateName imec-COSIC, KU Leuven, Leuven, Belgium
200 schema:name imec-COSIC, KU Leuven, Leuven, Belgium
201 rdf:type schema:Organization
202 grid-institutes:grid.7489.2 schema:alternateName Department of Computer Science, Ben-Gurion University, Beersheba, Israel
203 schema:name Department of Computer Science, Ben-Gurion University, Beersheba, Israel
204 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...