Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2020-08-10

AUTHORS

Tim Beyne , Anne Canteaut , Itai Dinur , Maria Eichlseder , Gregor Leander , Gaëtan Leurent , María Naya-Plasencia , Léo Perrin , Yu Sasaki , Yosuke Todo , Friedrich Wiemer

ABSTRACT

The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic. More... »

PAGES

299-328

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11

DOI

http://dx.doi.org/10.1007/978-3-030-56877-1_11

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1130046450


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "imec-COSIC, KU Leuven, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "imec-COSIC, KU Leuven, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Beyne", 
        "givenName": "Tim", 
        "id": "sg:person.016307275151.53", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016307275151.53"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Canteaut", 
        "givenName": "Anne", 
        "id": "sg:person.012730266023.08", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science, Ben-Gurion University, Beersheba, Israel", 
          "id": "http://www.grid.ac/institutes/grid.7489.2", 
          "name": [
            "Department of Computer Science, Ben-Gurion University, Beersheba, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dinur", 
        "givenName": "Itai", 
        "id": "sg:person.012046016703.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012046016703.69"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Graz University of Technology, Graz, Austria", 
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Eichlseder", 
        "givenName": "Maria", 
        "id": "sg:person.014606337775.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014606337775.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leander", 
        "givenName": "Gregor", 
        "id": "sg:person.016572560277.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016572560277.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leurent", 
        "givenName": "Ga\u00ebtan", 
        "id": "sg:person.016371722741.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016371722741.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Perrin", 
        "givenName": "L\u00e9o", 
        "id": "sg:person.011075613613.62", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011075613613.62"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/grid.419819.c", 
          "name": [
            "NTT Secure Platform Laboratories, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sasaki", 
        "givenName": "Yu", 
        "id": "sg:person.014072424160.79", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NTT Secure Platform Laboratories, Tokyo, Japan", 
          "id": "http://www.grid.ac/institutes/grid.419819.c", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
            "NTT Secure Platform Laboratories, Tokyo, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Todo", 
        "givenName": "Yosuke", 
        "id": "sg:person.013247762751.78", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013247762751.78"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "cryptosolutions, Essen, Germany", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Ruhr-Universit\u00e4t Bochum, Bochum, Germany", 
            "cryptosolutions, Essen, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wiemer", 
        "givenName": "Friedrich", 
        "id": "sg:person.07404240044.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07404240044.70"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2020-08-10", 
    "datePublishedReg": "2020-08-10", 
    "description": "The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic.", 
    "editor": [
      {
        "familyName": "Micciancio", 
        "givenName": "Daniele", 
        "type": "Person"
      }, 
      {
        "familyName": "Ristenpart", 
        "givenName": "Thomas", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-56877-1_11", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-030-56876-4", 
        "978-3-030-56877-1"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2020", 
      "type": "Book"
    }, 
    "keywords": [
      "hash function", 
      "proof system", 
      "cryptographic techniques", 
      "security level", 
      "security evaluation", 
      "such primitives", 
      "symmetric primitives", 
      "sponge construction", 
      "primitives", 
      "practical collision attacks", 
      "implementation constraints", 
      "cryptanalytic techniques", 
      "collision attack", 
      "preimage attack", 
      "concrete setting", 
      "design approach", 
      "attacks", 
      "public challenge", 
      "new proposal", 
      "SNARKs", 
      "recent family", 
      "practical use", 
      "security", 
      "Bulletproofs", 
      "standard design approach", 
      "system", 
      "technique", 
      "constraints", 
      "distinguisher", 
      "instances", 
      "proposal", 
      "protocol", 
      "permutations", 
      "performance", 
      "challenges", 
      "version", 
      "odd characteristic", 
      "work", 
      "construction", 
      "evaluation", 
      "use", 
      "field", 
      "function", 
      "results", 
      "setting", 
      "parameters", 
      "reasons", 
      "characteristics", 
      "most parameters", 
      "levels", 
      "family", 
      "approach"
    ], 
    "name": "Out of Oddity \u2013 New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems", 
    "pagination": "299-328", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1130046450"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-56877-1_11"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-56877-1_11", 
      "https://app.dimensions.ai/details/publication/pub.1130046450"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_152.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-56877-1_11"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-56877-1_11'


 

This table displays all metadata directly associated to this object as RDF triples.

204 TRIPLES      22 PREDICATES      76 URIs      69 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-56877-1_11 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N453a4ba3a0d64da5ad4677617cfc421b
4 schema:datePublished 2020-08-10
5 schema:datePublishedReg 2020-08-10
6 schema:description The security and performance of many integrity proof systems like SNARKs, STARKs and Bulletproofs highly depend on the underlying hash function. For this reason several new proposals have recently been developed. These primitives obviously require an in-depth security evaluation, especially since their implementation constraints have led to less standard design approaches. This work compares the security levels offered by two recent families of such primitives, namely GMiMC and HadesMiMC. We exhibit low-complexity distinguishers against the GMiMC and HadesMiMC permutations for most parameters proposed in recently launched public challenges for STARK-friendly hash functions. In the more concrete setting of the sponge construction corresponding to the practical use in the ZK-STARK protocol, we present a practical collision attack on a round-reduced version of GMiMC and a preimage attack on some instances of HadesMiMC. To achieve those results, we adapt and generalize several cryptographic techniques to fields of odd characteristic.
7 schema:editor N4ba24569b14441ee99e9e4b23cf14daa
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N672f9d3814e046f8836cd0a545e081f0
11 schema:keywords Bulletproofs
12 SNARKs
13 approach
14 attacks
15 challenges
16 characteristics
17 collision attack
18 concrete setting
19 constraints
20 construction
21 cryptanalytic techniques
22 cryptographic techniques
23 design approach
24 distinguisher
25 evaluation
26 family
27 field
28 function
29 hash function
30 implementation constraints
31 instances
32 levels
33 most parameters
34 new proposal
35 odd characteristic
36 parameters
37 performance
38 permutations
39 practical collision attacks
40 practical use
41 preimage attack
42 primitives
43 proof system
44 proposal
45 protocol
46 public challenge
47 reasons
48 recent family
49 results
50 security
51 security evaluation
52 security level
53 setting
54 sponge construction
55 standard design approach
56 such primitives
57 symmetric primitives
58 system
59 technique
60 use
61 version
62 work
63 schema:name Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems
64 schema:pagination 299-328
65 schema:productId N2e9ae4d58de0491ea42866d27b8e5128
66 Nff8df01b81c74483a5ba86255c900fb5
67 schema:publisher N6c447052d2734dc1b5729a4cb4914ef1
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1130046450
69 https://doi.org/10.1007/978-3-030-56877-1_11
70 schema:sdDatePublished 2022-12-01T06:47
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher Ne45f9dfae3a34ab5807c8d5927e21a4f
73 schema:url https://doi.org/10.1007/978-3-030-56877-1_11
74 sgo:license sg:explorer/license/
75 sgo:sdDataset chapters
76 rdf:type schema:Chapter
77 N1bca6a5362df4e39a00d0b0225fcb818 schema:familyName Micciancio
78 schema:givenName Daniele
79 rdf:type schema:Person
80 N249fbe511b274276b03772149e03c28e rdf:first sg:person.012046016703.69
81 rdf:rest N96d340c9c163429ca703de851adadf1e
82 N270c44bfe4124187a99cc5c21751d406 rdf:first sg:person.012730266023.08
83 rdf:rest N249fbe511b274276b03772149e03c28e
84 N2e9ae4d58de0491ea42866d27b8e5128 schema:name doi
85 schema:value 10.1007/978-3-030-56877-1_11
86 rdf:type schema:PropertyValue
87 N4258bd69274e4e3cb5d0c3ca670d4dc0 schema:familyName Ristenpart
88 schema:givenName Thomas
89 rdf:type schema:Person
90 N453a4ba3a0d64da5ad4677617cfc421b rdf:first sg:person.016307275151.53
91 rdf:rest N270c44bfe4124187a99cc5c21751d406
92 N4ba24569b14441ee99e9e4b23cf14daa rdf:first N1bca6a5362df4e39a00d0b0225fcb818
93 rdf:rest N77ea7212e9ef4a89b8ac960f4d17d59b
94 N672f9d3814e046f8836cd0a545e081f0 schema:isbn 978-3-030-56876-4
95 978-3-030-56877-1
96 schema:name Advances in Cryptology – CRYPTO 2020
97 rdf:type schema:Book
98 N6c447052d2734dc1b5729a4cb4914ef1 schema:name Springer Nature
99 rdf:type schema:Organisation
100 N77ea7212e9ef4a89b8ac960f4d17d59b rdf:first N4258bd69274e4e3cb5d0c3ca670d4dc0
101 rdf:rest rdf:nil
102 N817fffa71e0745959aa9a972308f2dde rdf:first sg:person.013206304341.94
103 rdf:rest Nccc242b455e34a7ca63012cd38b57e81
104 N946fbd3ad5c2454381199e8029a742ee rdf:first sg:person.016572560277.70
105 rdf:rest Neb9cb7c852d14677a6508978560f86c7
106 N96d340c9c163429ca703de851adadf1e rdf:first sg:person.014606337775.51
107 rdf:rest N946fbd3ad5c2454381199e8029a742ee
108 Na792592a978147d7a5a95efcceea667a rdf:first sg:person.013247762751.78
109 rdf:rest Ne2a1309146e645939143968a04865650
110 Nccc242b455e34a7ca63012cd38b57e81 rdf:first sg:person.011075613613.62
111 rdf:rest Nf80c3b1bf4c44a89a42a0a1fefced100
112 Ne2a1309146e645939143968a04865650 rdf:first sg:person.07404240044.70
113 rdf:rest rdf:nil
114 Ne45f9dfae3a34ab5807c8d5927e21a4f schema:name Springer Nature - SN SciGraph project
115 rdf:type schema:Organization
116 Neb9cb7c852d14677a6508978560f86c7 rdf:first sg:person.016371722741.32
117 rdf:rest N817fffa71e0745959aa9a972308f2dde
118 Nf80c3b1bf4c44a89a42a0a1fefced100 rdf:first sg:person.014072424160.79
119 rdf:rest Na792592a978147d7a5a95efcceea667a
120 Nff8df01b81c74483a5ba86255c900fb5 schema:name dimensions_id
121 schema:value pub.1130046450
122 rdf:type schema:PropertyValue
123 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
124 schema:name Information and Computing Sciences
125 rdf:type schema:DefinedTerm
126 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
127 schema:name Computation Theory and Mathematics
128 rdf:type schema:DefinedTerm
129 sg:person.011075613613.62 schema:affiliation grid-institutes:grid.5328.c
130 schema:familyName Perrin
131 schema:givenName Léo
132 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011075613613.62
133 rdf:type schema:Person
134 sg:person.012046016703.69 schema:affiliation grid-institutes:grid.7489.2
135 schema:familyName Dinur
136 schema:givenName Itai
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012046016703.69
138 rdf:type schema:Person
139 sg:person.012730266023.08 schema:affiliation grid-institutes:grid.5328.c
140 schema:familyName Canteaut
141 schema:givenName Anne
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012730266023.08
143 rdf:type schema:Person
144 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
145 schema:familyName Naya-Plasencia
146 schema:givenName María
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
148 rdf:type schema:Person
149 sg:person.013247762751.78 schema:affiliation grid-institutes:grid.419819.c
150 schema:familyName Todo
151 schema:givenName Yosuke
152 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013247762751.78
153 rdf:type schema:Person
154 sg:person.014072424160.79 schema:affiliation grid-institutes:grid.419819.c
155 schema:familyName Sasaki
156 schema:givenName Yu
157 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014072424160.79
158 rdf:type schema:Person
159 sg:person.014606337775.51 schema:affiliation grid-institutes:grid.5570.7
160 schema:familyName Eichlseder
161 schema:givenName Maria
162 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014606337775.51
163 rdf:type schema:Person
164 sg:person.016307275151.53 schema:affiliation grid-institutes:grid.5596.f
165 schema:familyName Beyne
166 schema:givenName Tim
167 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016307275151.53
168 rdf:type schema:Person
169 sg:person.016371722741.32 schema:affiliation grid-institutes:grid.5328.c
170 schema:familyName Leurent
171 schema:givenName Gaëtan
172 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016371722741.32
173 rdf:type schema:Person
174 sg:person.016572560277.70 schema:affiliation grid-institutes:grid.5570.7
175 schema:familyName Leander
176 schema:givenName Gregor
177 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016572560277.70
178 rdf:type schema:Person
179 sg:person.07404240044.70 schema:affiliation grid-institutes:None
180 schema:familyName Wiemer
181 schema:givenName Friedrich
182 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07404240044.70
183 rdf:type schema:Person
184 grid-institutes:None schema:alternateName cryptosolutions, Essen, Germany
185 schema:name Ruhr-Universität Bochum, Bochum, Germany
186 cryptosolutions, Essen, Germany
187 rdf:type schema:Organization
188 grid-institutes:grid.419819.c schema:alternateName NTT Secure Platform Laboratories, Tokyo, Japan
189 schema:name NTT Secure Platform Laboratories, Tokyo, Japan
190 Ruhr-Universität Bochum, Bochum, Germany
191 rdf:type schema:Organization
192 grid-institutes:grid.5328.c schema:alternateName Inria, Paris, France
193 schema:name Inria, Paris, France
194 rdf:type schema:Organization
195 grid-institutes:grid.5570.7 schema:alternateName Ruhr-Universität Bochum, Bochum, Germany
196 schema:name Graz University of Technology, Graz, Austria
197 Ruhr-Universität Bochum, Bochum, Germany
198 rdf:type schema:Organization
199 grid-institutes:grid.5596.f schema:alternateName imec-COSIC, KU Leuven, Leuven, Belgium
200 schema:name imec-COSIC, KU Leuven, Leuven, Belgium
201 rdf:type schema:Organization
202 grid-institutes:grid.7489.2 schema:alternateName Department of Computer Science, Ben-Gurion University, Beersheba, Israel
203 schema:name Department of Computer Science, Ben-Gurion University, Beersheba, Israel
204 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...