@dblp

Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.

, , , и . CRYPTO, том 1462 из Lecture Notes in Computer Science, стр. 390-407. Springer, (1998)

Линки и ресурсы

тэги