The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Top Cited Papers
- 1 January 2006
- book chapter
- Published by Springer Nature
- p. 409-426
- https://doi.org/10.1007/11761679_25
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- New Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge ProofsPublished by Springer Nature ,2001
- How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)Journal of Cryptology, 2001
- Attacking Triple EncryptionPublished by Springer Nature ,1998
- Security amplification by composition: The case of doubly-iterated, ideal ciphersPublished by Springer Nature ,1998
- Cascade ciphers: The importance of being firstJournal of Cryptology, 1993
- A construction of a cipher from a single pseudorandom permutationPublished by Springer Nature ,1993
- On the power of cascade ciphersACM Transactions on Computer Systems, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- On the security of multiple encryptionCommunications of the ACM, 1981
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977