Cascade Ciphers: The Importance of Being First (1993)

by Ueli M. Maurer , James L. Massey
Citations:25 - 2 self

Active Bibliography

1 Security Amplication by Composition: The case of Doubly-Iterated, Ideal Ciphers – W. Aiello, M. Bellare G. Di Crescenzo, M. Bellare, G. Di, Crescenzo R. Venkatesan
ON THE CONSTRUCTION OF STRONG CIPHERS FROM WEAK ONES – Abdolrahman Al Jabri
On The Security of Cascaded Ciphers – Abdolrahman Al Jabri
12 Security Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers – W. Aiello, M. Bellare, G. Di Crescenzo, R. Venkatesan - 1998
1 Cryptology – Prof Ronald Rivest, L. Rivest
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
unknown title – Foreword Whitfield Diffie
35 Chosen-Ciphertext Security of Multiple Encryption – Yevgeniy Dodis, Jonathan Katz - 2005
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
136 An Efficient Off-line Electronic Cash System Based On The Representation Problem – Stefan Brands - 1993
1 Integrity Checks Used for Security Can Also Be Used for Error Control. – Tim Moors Moors
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers – unknown authors
Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers – unknown authors
32 A Known-Plaintext Attack on Two-Key Triple Encryption – Paul C. Van Oorschot, Michael J. Wiener - 1990
2 A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN – Andrey Bogdanov, Christian Rechberger
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
42 Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions – Moni Naor , Omer Reingold - 1995
149 Number-theoretic constructions of efficient pseudo-random functions – Moni Naor, Omer Reingold - 1997
29 On robust combiners for oblivious transfer and other primitives – Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen - 2005