Security amplification by composition: The case of doubly-iterated, ideal ciphers
- 1 January 1998
- book chapter
- Published by Springer Nature
- p. 390-407
- https://doi.org/10.1007/bfb0055743
Abstract
No abstract availableKeywords
All Related Versions
This publication has 8 references indexed in Scilit:
- Linear Cryptanalysis Method for DES CipherPublished by Springer Nature ,1994
- Cascade ciphers: The importance of being firstJournal of Cryptology, 1993
- A Known-Plaintext Attack on Two-Key Triple EncryptionPublished by Springer Nature ,1991
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991
- On the power of cascade ciphersACM Transactions on Computer Systems, 1985
- On the security of multiple encryptionCommunications of the ACM, 1981
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949