The game-playing technique and its application to triple encryption. Cryptology ePrint Archive, Report 2004/331 (2004)

by M Bellare, P Rogaway