Cascade Encryption Revisited
暂无分享,去创建一个
[1] Mihir Bellare,et al. Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms , 2007, ICALP.
[2] Oded Goldreich,et al. On the power of cascade ciphers , 1985, TOCS.
[3] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[4] Ueli Maurer,et al. Indistinguishability of Random Systems , 2002, EUROCRYPT.
[5] Thomas Shrimpton,et al. Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem , 2006, IACR Cryptol. ePrint Arch..
[6] Ueli Maurer,et al. Indistinguishability Amplification , 2007, CRYPTO.
[7] Ueli Maurer,et al. Cascade ciphers: The importance of being first , 1993, Journal of Cryptology.
[8] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[9] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[10] Giovanni Di Crescenzo,et al. Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers , 1998, CRYPTO.
[12] Mihir Bellare,et al. Code-Based Game-Playing Proofs and the Security of Triple Encryption , 2004, IACR Cryptol. ePrint Arch..
[13] Y. Mansour,et al. A CONSTRUCTION OF A CIPHER FROM A , 1991 .
[14] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[15] Jean-Sébastien Coron,et al. The Random Oracle Model and the Ideal Cipher Model Are Equivalent , 2008, CRYPTO.
[16] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[17] Yishay Mansour,et al. A Construction of a Cioher From a Single Pseudorandom Permutation , 1991, ASIACRYPT.