ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-08-02

AUTHORS

Tetsu Iwata , Kazuhiko Minematsu , Thomas Peyrin , Yannick Seurin

ABSTRACT

We propose a new mode of operation called \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit blocks and t-bit tweaks, our construction provides security (as a variable-input-length PRF) beyond the birthday bound with respect to the block-length n and allows to process \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$n+t$$ \end{document} bits of inputs per TBC call. In comparison, previous TBC-based modes such as PMAC1, the TBC-based generalization of the seminal PMAC mode (Black and Rogaway, EUROCRYPT 2002) or PMAC_TBC1k (Naito, ProvSec 2015) only process n bits of input per TBC call. Since an n-bit block, t-bit tweak TBC can process at most \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$n+t$$ \end{document} bits of input per call, the efficiency of our construction is essentially optimal, while achieving beyond-birthday-bound security. The \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} mode is fully parallelizable and can be directly instantiated with several concrete TBC proposals, such as Deoxys and SKINNY. We also use \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} to construct a stateless and deterministic Authenticated Encryption scheme called \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZAE}$$ \end{document} which is very efficient and secure beyond the birthday bound. More... »

PAGES

34-65

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-63697-9_2

DOI

http://dx.doi.org/10.1007/978-3-319-63697-9_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091024666


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nagoya University, Nagoya, Japan", 
          "id": "http://www.grid.ac/institutes/grid.27476.30", 
          "name": [
            "Nagoya University, Nagoya, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Iwata", 
        "givenName": "Tetsu", 
        "id": "sg:person.012473303607.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012473303607.85"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "NEC Corporation, Kawasaki, Japan", 
          "id": "http://www.grid.ac/institutes/grid.420377.5", 
          "name": [
            "NEC Corporation, Kawasaki, Japan"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Minematsu", 
        "givenName": "Kazuhiko", 
        "id": "sg:person.012775764517.05", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012775764517.05"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Temasek Laboratories, Nanyang Technological University, Singapore, Singapore", 
          "id": "http://www.grid.ac/institutes/grid.59025.3b", 
          "name": [
            "School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore", 
            "School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore", 
            "Temasek Laboratories, Nanyang Technological University, Singapore, Singapore"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Peyrin", 
        "givenName": "Thomas", 
        "id": "sg:person.011167161615.31", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ANSSI, Paris, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "ANSSI, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-08-02", 
    "datePublishedReg": "2017-08-02", 
    "description": "We propose a new mode of operation called \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$\\mathsf {ZMAC}$$\n\\end{document} allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit blocks and t-bit tweaks, our construction provides security (as a variable-input-length PRF) beyond the birthday bound with respect to the block-length n and allows to process \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$n+t$$\n\\end{document} bits of inputs per TBC call. In comparison, previous TBC-based modes such as PMAC1, the TBC-based generalization of the seminal PMAC mode (Black and Rogaway, EUROCRYPT\u00a02002) or PMAC_TBC1k (Naito, ProvSec\u00a02015) only process n bits of input per TBC call. Since an n-bit block, t-bit tweak TBC can process at most \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$n+t$$\n\\end{document} bits of input per call, the efficiency of our construction is essentially optimal, while achieving beyond-birthday-bound security. The \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$\\mathsf {ZMAC}$$\n\\end{document} mode is fully parallelizable and can be directly instantiated with several concrete TBC proposals, such as Deoxys and SKINNY. We also use \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$\\mathsf {ZMAC}$$\n\\end{document} to construct a stateless and deterministic Authenticated Encryption scheme called \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}\n$$\\mathsf {ZAE}$$\n\\end{document} which is very efficient and secure beyond the birthday bound.", 
    "editor": [
      {
        "familyName": "Katz", 
        "givenName": "Jonathan", 
        "type": "Person"
      }, 
      {
        "familyName": "Shacham", 
        "givenName": "Hovav", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-63697-9_2", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-63696-2", 
        "978-3-319-63697-9"
      ], 
      "name": "Advances in Cryptology \u2013 CRYPTO 2017", 
      "type": "Book"
    }, 
    "keywords": [
      "message authentication code", 
      "tweakable block cipher", 
      "bits of input", 
      "n-bit blocks", 
      "Authenticated Encryption Scheme", 
      "block cipher mode", 
      "secure message authentication", 
      "authentication codes", 
      "birthday-bound security", 
      "encryption scheme", 
      "message authentication", 
      "block cipher", 
      "cipher modes", 
      "security", 
      "bits", 
      "n bits", 
      "authentication", 
      "cipher", 
      "input", 
      "stateless", 
      "code", 
      "calls", 
      "scheme", 
      "block", 
      "proposal", 
      "SKINNY", 
      "new mode", 
      "operation", 
      "TWEAK", 
      "construction", 
      "efficiency", 
      "generalization", 
      "mode", 
      "respect", 
      "comparison", 
      "birthday", 
      "deoxy"
    ], 
    "name": "ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication", 
    "pagination": "34-65", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091024666"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-63697-9_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-63697-9_2", 
      "https://app.dimensions.ai/details/publication/pub.1091024666"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:48", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_195.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-63697-9_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-63697-9_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-63697-9_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-63697-9_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-63697-9_2'


 

This table displays all metadata directly associated to this object as RDF triples.

133 TRIPLES      22 PREDICATES      61 URIs      54 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-63697-9_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Naed8cf8189c14ea8a453886e9641177f
4 schema:datePublished 2017-08-02
5 schema:datePublishedReg 2017-08-02
6 schema:description We propose a new mode of operation called \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit blocks and t-bit tweaks, our construction provides security (as a variable-input-length PRF) beyond the birthday bound with respect to the block-length n and allows to process \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$n+t$$ \end{document} bits of inputs per TBC call. In comparison, previous TBC-based modes such as PMAC1, the TBC-based generalization of the seminal PMAC mode (Black and Rogaway, EUROCRYPT 2002) or PMAC_TBC1k (Naito, ProvSec 2015) only process n bits of input per TBC call. Since an n-bit block, t-bit tweak TBC can process at most \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$n+t$$ \end{document} bits of input per call, the efficiency of our construction is essentially optimal, while achieving beyond-birthday-bound security. The \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} mode is fully parallelizable and can be directly instantiated with several concrete TBC proposals, such as Deoxys and SKINNY. We also use \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZMAC}$$ \end{document} to construct a stateless and deterministic Authenticated Encryption scheme called \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\mathsf {ZAE}$$ \end{document} which is very efficient and secure beyond the birthday bound.
7 schema:editor N9861403c8a5a48d7b741af43768901bf
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf Nf02f2cd284b34092837c5ab3c089403b
11 schema:keywords Authenticated Encryption Scheme
12 SKINNY
13 TWEAK
14 authentication
15 authentication codes
16 birthday
17 birthday-bound security
18 bits
19 bits of input
20 block
21 block cipher
22 block cipher mode
23 calls
24 cipher
25 cipher modes
26 code
27 comparison
28 construction
29 deoxy
30 efficiency
31 encryption scheme
32 generalization
33 input
34 message authentication
35 message authentication code
36 mode
37 n bits
38 n-bit blocks
39 new mode
40 operation
41 proposal
42 respect
43 scheme
44 secure message authentication
45 security
46 stateless
47 tweakable block cipher
48 schema:name ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
49 schema:pagination 34-65
50 schema:productId N2390761736644a9e9e85a857f926ee00
51 N8638a7e86a5e49daa8913c27c0eeb5c8
52 schema:publisher N8429419e9b634bb9a01133724db4c06b
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091024666
54 https://doi.org/10.1007/978-3-319-63697-9_2
55 schema:sdDatePublished 2022-12-01T06:48
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher N809ac59aa1e54d68bf336f0edadb1050
58 schema:url https://doi.org/10.1007/978-3-319-63697-9_2
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N2390761736644a9e9e85a857f926ee00 schema:name doi
63 schema:value 10.1007/978-3-319-63697-9_2
64 rdf:type schema:PropertyValue
65 N5c5e412ad0a548f298516babddb6e788 schema:familyName Shacham
66 schema:givenName Hovav
67 rdf:type schema:Person
68 N809ac59aa1e54d68bf336f0edadb1050 schema:name Springer Nature - SN SciGraph project
69 rdf:type schema:Organization
70 N8429419e9b634bb9a01133724db4c06b schema:name Springer Nature
71 rdf:type schema:Organisation
72 N8638a7e86a5e49daa8913c27c0eeb5c8 schema:name dimensions_id
73 schema:value pub.1091024666
74 rdf:type schema:PropertyValue
75 N90a5427759564c14be30c1990ce02f2d schema:familyName Katz
76 schema:givenName Jonathan
77 rdf:type schema:Person
78 N9861403c8a5a48d7b741af43768901bf rdf:first N90a5427759564c14be30c1990ce02f2d
79 rdf:rest Nf38bf0b785da46999e4bb4aeb5a993c9
80 Na441d7ebf1454648b500af878b4de988 rdf:first sg:person.012775764517.05
81 rdf:rest Nc0e9e1688dcb40f782b92f233ab834ff
82 Naed8cf8189c14ea8a453886e9641177f rdf:first sg:person.012473303607.85
83 rdf:rest Na441d7ebf1454648b500af878b4de988
84 Nc0e9e1688dcb40f782b92f233ab834ff rdf:first sg:person.011167161615.31
85 rdf:rest Ncb6a7eb92ca944a490fcbcb8cb5ee338
86 Ncb6a7eb92ca944a490fcbcb8cb5ee338 rdf:first sg:person.011724731171.01
87 rdf:rest rdf:nil
88 Nf02f2cd284b34092837c5ab3c089403b schema:isbn 978-3-319-63696-2
89 978-3-319-63697-9
90 schema:name Advances in Cryptology – CRYPTO 2017
91 rdf:type schema:Book
92 Nf38bf0b785da46999e4bb4aeb5a993c9 rdf:first N5c5e412ad0a548f298516babddb6e788
93 rdf:rest rdf:nil
94 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
95 schema:name Information and Computing Sciences
96 rdf:type schema:DefinedTerm
97 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
98 schema:name Data Format
99 rdf:type schema:DefinedTerm
100 sg:person.011167161615.31 schema:affiliation grid-institutes:grid.59025.3b
101 schema:familyName Peyrin
102 schema:givenName Thomas
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31
104 rdf:type schema:Person
105 sg:person.011724731171.01 schema:affiliation grid-institutes:None
106 schema:familyName Seurin
107 schema:givenName Yannick
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
109 rdf:type schema:Person
110 sg:person.012473303607.85 schema:affiliation grid-institutes:grid.27476.30
111 schema:familyName Iwata
112 schema:givenName Tetsu
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012473303607.85
114 rdf:type schema:Person
115 sg:person.012775764517.05 schema:affiliation grid-institutes:grid.420377.5
116 schema:familyName Minematsu
117 schema:givenName Kazuhiko
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012775764517.05
119 rdf:type schema:Person
120 grid-institutes:None schema:alternateName ANSSI, Paris, France
121 schema:name ANSSI, Paris, France
122 rdf:type schema:Organization
123 grid-institutes:grid.27476.30 schema:alternateName Nagoya University, Nagoya, Japan
124 schema:name Nagoya University, Nagoya, Japan
125 rdf:type schema:Organization
126 grid-institutes:grid.420377.5 schema:alternateName NEC Corporation, Kawasaki, Japan
127 schema:name NEC Corporation, Kawasaki, Japan
128 rdf:type schema:Organization
129 grid-institutes:grid.59025.3b schema:alternateName Temasek Laboratories, Nanyang Technological University, Singapore, Singapore
130 schema:name School of Computer Science and Engineering, Nanyang Technological University, Singapore, Singapore
131 School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore
132 Temasek Laboratories, Nanyang Technological University, Singapore, Singapore
133 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...