Cascade Ciphers: The Importance of Being First (1993)

by Ueli M. Maurer , James L. Massey
Citations:25 - 2 self

Documents Related by Co-Citation

29 On the power of cascade ciphers – S Even, O Goldreich - 1985
786 Communication Theory of Secrecy Systems – C E Shannon
47 On the Security of Multiple Encryption – Ralph C. Merkle, Martin E. Hellman - 1981
1747 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
35 Chosen-Ciphertext Security of Multiple Encryption – Yevgeniy Dodis, Jonathan Katz - 2005
88 How to protect DES against exhaustive key search – Joe Kilian, Phillip Rogaway - 1996
70 Exhaustive cryptanalysis of the NBS data encryption standard – W Diffie, M E Hellman - 1977
11 An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems – Charles Asmuth, G R Blakely - 1981
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
50 A Construction of a Cipher From a Single Pseudorandom Permutation – Shimon Even, Yishay Mansour - 1991
13 On robust combiners for private information retrieval and other primitives – Remo Meier, Bartosz Przydatek - 2006
11 On tolerant cryptographic constructions – A Herzberg - 2005
29 On robust combiners for oblivious transfer and other primitives – Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen - 2005
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
98 Collision-resistant hashing: Towards making UOWHFs practical – Mihir Bellare, Philip Rogaway - 1997
64 Foundations of Cryptography: Volume 1 – O Goldreich - 2004
12 Security Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers – W. Aiello, M. Bellare, G. Di Crescenzo, R. Venkatesan - 1998
32 A Known-Plaintext Attack on Two-Key Triple Encryption – Paul C. Van Oorschot, Michael J. Wiener - 1990
109 Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract) РClaude Cr̩peau, Joe Kilian - 1988