Login / Signup
Security amplification by composition: The case of doubly-iterated ideal ciphers
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
Published in:
CoRR (1998)
Keyphrases
</>
access control
intrusion detection
stream cipher
network security
security policies
key management
security protocols
security systems
security threats