Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography (2000)

by M Bellare, P Rogaway
Venue:Advances in Cryptology | ASIACRYPT ' 00, volume 1976 of Lecture Notes in Computer Science