Article,

Security amplification by composition: The case of doubly-iterated ideal ciphers

, , , and .
CoRR, (1998)

Meta data

Tags

Users

  • @dblp

Comments and Reviews