Login / Signup
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
Published in:
CRYPTO (1998)
Keyphrases
</>
stream cipher
chosen plaintext
database
network security
security issues
security protocols
neural network
artificial intelligence
access control
intrusion detection
security requirements
key management
security problems