Pseudorandom functions revisited: The cascade construction and its concrete security," Proc. 37th Annual Symposium on the Foundations of Computer 2This section has not been discussed in the lectures (1997)

by M Bellare, R Canetti, H Krawczyk
Venue:Appeared in Information Security, 1st International Workshop, ISW 1997, Lecture Notes in Computer Science 1396