Conference paper
Lecture Notes in Computer Science, Colin Boyd, Leonie Simpson, Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, vol. 7959, Springer, 2013, pp. 268--285
APA
Click to copy
Isobe, T., Sasaki, Y., & Chen, J. (2013). Related-Key Boomerang Attacks on KATAN32/48/64. In C. Boyd & L. Simpson (Eds.), Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings (Vol. 7959, pp. 268–285). Springer.
Chicago/Turabian
Click to copy
Isobe, Takanori, Yu Sasaki, and Jiageng Chen. “Related-Key Boomerang Attacks on KATAN32/48/64.” In Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, edited by Colin Boyd and Leonie Simpson, 7959:268–285. Lecture Notes in Computer Science. Springer, 2013.
MLA
Click to copy
Isobe, Takanori, et al. “Related-Key Boomerang Attacks on KATAN32/48/64.” Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, edited by Colin Boyd and Leonie Simpson, vol. 7959, Springer, 2013, pp. 268–85.
BibTeX Click to copy
@inproceedings{isobe2013a,
title = {Related-Key Boomerang Attacks on KATAN32/48/64},
year = {2013},
pages = {268--285},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7959},
author = {Isobe, Takanori and Sasaki, Yu and Chen, Jiageng},
editor = {Boyd, Colin and Simpson, Leonie},
booktitle = {Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}
}