Security Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers (1998)

by W. Aiello , M. Bellare , G. Di Crescenzo , R. Venkatesan
Citations:12 - 1 self