@dblp

Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.

, , , and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 390-407. Springer, (1998)

Links and resources

Tags