R.: Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers (1998)

by W Aiello, M Bellare, G D Crescenzo, Venkatesan
Venue:CRYPTO. Volume 1462 of Lecture Notes in Computer Science