Login / Signup
Security amplification by composition: The case of doubly-iterated, ideal ciphers.
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
Published in:
IACR Cryptol. ePrint Arch. (1998)
Keyphrases
</>
access control
stream cipher
information security
security issues
key management
computer security
chosen plaintext
intrusion detection
network security
statistical databases